General
-
Target
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.zip
-
Size
36KB
-
Sample
210916-ylfhfaecb8
-
MD5
b6e20a3378a63ba2d38bc299bd61b5c0
-
SHA1
caa1ebc1d54cf0bc0048a374515c2f0f2b732d85
-
SHA256
83ac6dd25820e1b6b826c2d52a28bf71506fec4f8320d4f51f3a0cfd739502f3
-
SHA512
500a905f881248bbc8af3df9a087f27a802fbcf15ae1a4c95d4184a3f88bacd6f662863a48861b18907e0d9c4c1162c7edfea7a56f5124a347192ccf22b52f0e
Static task
static1
Behavioral task
behavioral1
Sample
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe
Resource
win10v20210408
Malware Config
Extracted
blackmatter
1.2
512478c08dada2af19e49808fbda5b0b
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
120Heisler
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
Tesla2019
Protocol: smtp- Port:
587 - Username:
[email protected] - Password:
iteam8**
https://paymenthacks.com
http://paymenthacks.com
https://mojobiden.com
http://mojobiden.com
-
attempt_auth
true
-
create_mutex
true
-
encrypt_network_shares
true
-
exfiltrate
true
-
mount_volumes
true
Targets
-
-
Target
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720.exe
-
Size
67KB
-
MD5
e6b0276bc3f541d8ff1ebb1b59c8bd29
-
SHA1
295de44a0adbef57c51458978ccd71437aff0bf1
-
SHA256
daed41395ba663bef2c52e3d1723ac46253a9008b582bb8d9da9cb0044991720
-
SHA512
cdc851b9a7dc396384cbd69353f4e594cb3ac80679abfaa9ebf7bf849bca1b2e2c233c9634239e4aaa4e7f02a2af096733bef1b760ae0e6d660918217cecdcee
Score3/10 -