Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    05-01-2021 22:23

General

  • Target

    568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe

  • Size

    13.1MB

  • MD5

    a7f3e4b00b03cb8d28db7961626c757c

  • SHA1

    02873790ac509f38bb502c7f4902d1dbe7acc915

  • SHA256

    568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb

  • SHA512

    edb361482c1439827a8610dec0601fc34f504606a3781fba45c0861b8e3fe552b543b56b6443b8473cc76aeec544c1ca4fb9e92fc3a5a1a7f6b064276838de48

Score
10/10

Malware Config

Signatures

  • Detect ElectroRat cryptocurrency stealer 1 IoCs
  • ElectroRat

    A stealer family often targeting cryptocurrency users and distributed via fake cryptocurrency applications.

  • Drops startup file 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\568326883f9157fe8f1a7c681e2df341973a75205cf81d627040d101ce24f1bb.bin.exe"
    1⤵
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\system32\cmd.exe
      cmd ver
      2⤵
        PID:2224

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1628-2-0x0000000000400000-0x000000000109A000-memory.dmp

      Filesize

      12.6MB

    • memory/2224-3-0x0000000000000000-mapping.dmp