General
-
Target
supremacy.rar
-
Size
26.5MB
-
Sample
210606-8xe3xkelt2
-
MD5
92c9d3b76827d91480f918f51aadefe5
-
SHA1
71ae096b422bdc9f314f7e7c28855c946765791e
-
SHA256
f3f48cabdadc02e92cae84ba7440239f273b97bb53d2c97988acff0c07c5baef
-
SHA512
4ab291813a545d3d76f8809c7c3ee6b93c7b8ac785b5a56514c632d30bd66da04d73a0bf0a069edbfe7c8d2613871cd540a40a8797a1ef7e5dc4fc293d3c13a7
Static task
static1
Behavioral task
behavioral1
Sample
supremacy/.vs/supremacy_csgo/v16/Browse.VC-wal.db.exe
Resource
win7v20210410
Malware Config
Targets
-
-
Target
supremacy/.vs/supremacy_csgo/v16/Browse.VC-wal.db
-
Size
531KB
-
MD5
c8e781071aced942d989823c2e1dc107
-
SHA1
80322b92c1d45bc1d9ccc31856e4b0be46159fce
-
SHA256
dbf5add59cbb4c99672f0213347c5392b36b9da91c27d5307ea561f298277945
-
SHA512
63af46c19ae796fe3de276b88f82fdfebd91a632593ce1c1d0b846e41bdf619cb0bc706b0e548646a46f5c363c65d5fc15f9458e96f292cefb699b9c244dfb67
-
Echelon log file
Detects a log file produced by Echelon.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-