Static task
static1
Behavioral task
behavioral1
Sample
foo.msi
Resource
win7-en-20211104
Behavioral task
behavioral2
Sample
foo.msi
Resource
win10-en-20211104
General
-
Target
foo.msi
-
Size
64.2MB
-
MD5
2d070b14498b782e1fb3500ef50b0c2a
-
SHA1
475f50ea2192809daebb5ce61aaadc2a4708af24
-
SHA256
b5e4e29d5457654f954e4267723b05d447f311c6cf96723fdca761a8e94948ec
-
SHA512
0e5e7611f953500603baf4cd25788e75d36525c01e45e6b886a6a3896c78e1efc30579772215b78107a47e32950a7a58a8016882608037d00097a5088e7d510c
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
Processes:
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
-
Industroyer IEC-104 Module 1 IoCs
Contains strings related to Industroyer module used to communicate with power transmission grids over IEC-104 protocol.
Processes:
resource yara_rule sample win_industroyer_w3 -
Industroyer family
-
NetWire RAT payload 1 IoCs
Processes:
resource yara_rule sample netwire -
Netwire family
-
Detect jar appended to MSI 1 IoCs
Processes:
resource yara_rule sample jar_in_msi -
Document created with cracked Office version 1 IoCs
Office document contains Grizli777 string known to be caused by using a cracked version of the software.
Processes:
resource yara_rule sample grizli777_cracked_office
Files
-
foo.msi.msi .ps1