Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7 -
submitted
01-10-2020 23:32
Static task
static1
Behavioral task
behavioral1
Sample
448838b2a60484ee78c2198f2c0c9c85.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
448838b2a60484ee78c2198f2c0c9c85.bin.exe
Resource
win10
General
-
Target
448838b2a60484ee78c2198f2c0c9c85.bin.exe
-
Size
115KB
-
MD5
448838b2a60484ee78c2198f2c0c9c85
-
SHA1
f2c43a01cabaa694228f5354ea8c6bcf3b7a49b3
-
SHA256
64d78eec46c9ddd4b9a366de62ba0f2813267dc4393bc79e4c9a51a9bb7e6273
-
SHA512
9e532af06e5f4764529211e8c5c749baa7b01c72f11b603218c3c08d70cf1e732f8d9d81ec257ca247aaa96d1502150a2f402b1b3914780b6344222b007dd53f
Malware Config
Signatures
-
SlothfulMedia
SlothfulMedia is a malware used by sophisticated threat actors that drops a remote access tool.
-
SlothfulMedia Main Payload 3 IoCs
Processes:
resource yara_rule behavioral1/files/0x00040000000131cb-0.dat family_slothfulmedia behavioral1/files/0x00040000000131cb-1.dat family_slothfulmedia behavioral1/files/0x00040000000131cb-3.dat family_slothfulmedia -
Executes dropped EXE 2 IoCs
Processes:
mediaplayer.exeW5gEs.exepid Process 1860 mediaplayer.exe 1880 W5gEs.exe -
Deletes itself 1 IoCs
Processes:
W5gEs.exepid Process 1880 W5gEs.exe -
Loads dropped DLL 3 IoCs
Processes:
448838b2a60484ee78c2198f2c0c9c85.bin.exepid Process 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
448838b2a60484ee78c2198f2c0c9c85.bin.exedescription pid Process procid_target PID 240 wrote to memory of 1860 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 25 PID 240 wrote to memory of 1860 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 25 PID 240 wrote to memory of 1860 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 25 PID 240 wrote to memory of 1860 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 25 PID 240 wrote to memory of 1880 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 26 PID 240 wrote to memory of 1880 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 26 PID 240 wrote to memory of 1880 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 26 PID 240 wrote to memory of 1880 240 448838b2a60484ee78c2198f2c0c9c85.bin.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\448838b2a60484ee78c2198f2c0c9c85.bin.exe"C:\Users\Admin\AppData\Local\Temp\448838b2a60484ee78c2198f2c0c9c85.bin.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Users\Admin\AppData\Roaming\Media\mediaplayer.exe"C:\Users\Admin\AppData\Roaming\Media\mediaplayer.exe"2⤵
- Executes dropped EXE
PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\W5gEs.exe"C:\Users\Admin\AppData\Local\Temp\W5gEs.exe"2⤵
- Executes dropped EXE
- Deletes itself
PID:1880
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
64e3f894ce1fedbda8de9557ec25f048
SHA1eec441dc95a9194b73c8c9df73a3a6d8677b0607
SHA2560c65e44eac431125d4ee6c46052464aafdf668ac2fc27086efa3e062be173a15
SHA51285c23b279c723b8c72e32341cacecaa20407e4de21beb801b895c49a3010df81ebedb560c0407e14cef2cd80432b9ab1ca243f673537af7fa7f90cf46f339966
-
MD5
64e3f894ce1fedbda8de9557ec25f048
SHA1eec441dc95a9194b73c8c9df73a3a6d8677b0607
SHA2560c65e44eac431125d4ee6c46052464aafdf668ac2fc27086efa3e062be173a15
SHA51285c23b279c723b8c72e32341cacecaa20407e4de21beb801b895c49a3010df81ebedb560c0407e14cef2cd80432b9ab1ca243f673537af7fa7f90cf46f339966
-
MD5
9f23bd89694b66d8a67bb18434da4ee8
SHA1db8c6ea90b1be5aa560bfbe5a34577eb284243af
SHA256927d945476191a3523884f4c0784fb71c16b7738bd7f2abd1e3a198af403f0ae
SHA51272e95a90dc8ee2fd69b26665e88d19b1d36527fe8bbc03e252d4be925cf4acae20a3155dcd7caa50daf6e16d201a16822d77356c91654a6e4a05981425574c5b
-
MD5
64e3f894ce1fedbda8de9557ec25f048
SHA1eec441dc95a9194b73c8c9df73a3a6d8677b0607
SHA2560c65e44eac431125d4ee6c46052464aafdf668ac2fc27086efa3e062be173a15
SHA51285c23b279c723b8c72e32341cacecaa20407e4de21beb801b895c49a3010df81ebedb560c0407e14cef2cd80432b9ab1ca243f673537af7fa7f90cf46f339966
-
MD5
9f23bd89694b66d8a67bb18434da4ee8
SHA1db8c6ea90b1be5aa560bfbe5a34577eb284243af
SHA256927d945476191a3523884f4c0784fb71c16b7738bd7f2abd1e3a198af403f0ae
SHA51272e95a90dc8ee2fd69b26665e88d19b1d36527fe8bbc03e252d4be925cf4acae20a3155dcd7caa50daf6e16d201a16822d77356c91654a6e4a05981425574c5b
-
MD5
9f23bd89694b66d8a67bb18434da4ee8
SHA1db8c6ea90b1be5aa560bfbe5a34577eb284243af
SHA256927d945476191a3523884f4c0784fb71c16b7738bd7f2abd1e3a198af403f0ae
SHA51272e95a90dc8ee2fd69b26665e88d19b1d36527fe8bbc03e252d4be925cf4acae20a3155dcd7caa50daf6e16d201a16822d77356c91654a6e4a05981425574c5b