Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
05-01-2021 22:23
Static task
static1
Behavioral task
behavioral1
Sample
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe
Resource
win10v20201028
General
-
Target
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe
-
Size
13.1MB
-
MD5
a7f3e4b00b03cb8d28db7961626c757c
-
SHA1
02873790ac509f38bb502c7f4902d1dbe7acc915
-
SHA256
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb
-
SHA512
edb361482c1439827a8610dec0601fc34f504606a3781fba45c0861b8e3fe552b543b56b6443b8473cc76aeec544c1ca4fb9e92fc3a5a1a7f6b064276838de48
Malware Config
Signatures
-
Detect ElectroRat cryptocurrency stealer 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1076-3-0x0000000000400000-0x000000000109A000-memory.dmp family_electrorat behavioral1/memory/1076-2-0x0000000000400000-0x000000000109A000-memory.dmp family_electrorat behavioral1/memory/1076-4-0x0000000000400000-0x000000000109A000-memory.dmp family_electrorat -
ElectroRat
A stealer family often targeting cryptocurrency users and distributed via fake cryptocurrency applications.
-
Drops startup file 1 IoCs
Processes:
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\systemcl.lnk 568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exedescription pid process target process PID 1076 wrote to memory of 1172 1076 568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe cmd.exe PID 1076 wrote to memory of 1172 1076 568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe cmd.exe PID 1076 wrote to memory of 1172 1076 568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe"C:\Users\Admin\AppData\Local\Temp\568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\system32\cmd.execmd ver2⤵PID:1172
-