Analysis

  • max time kernel
    138s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 20:03

General

  • Target

    MarsSamples/97121634e7eda9ea36ad75a3094f55803b1bf2d76e5a048ec1baa32efeea3d9a.exe

  • Size

    159KB

  • MD5

    7f891c856812bff5ce95758558c0f81c

  • SHA1

    daca810dc62f62019beb7300d207118aeff72b4a

  • SHA256

    97121634e7eda9ea36ad75a3094f55803b1bf2d76e5a048ec1baa32efeea3d9a

  • SHA512

    743c00c56f44f10b5a67785d43e69af27d0f0508edbb21da739de7e5ed81ebe812209705304c5caab1ad83796d65eac0e7fe9282fd71f8a8d798ca064a7cbe53

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\MarsSamples\97121634e7eda9ea36ad75a3094f55803b1bf2d76e5a048ec1baa32efeea3d9a.exe
    "C:\Users\Admin\AppData\Local\Temp\MarsSamples\97121634e7eda9ea36ad75a3094f55803b1bf2d76e5a048ec1baa32efeea3d9a.exe"
    1⤵
      PID:4380

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4380-130-0x0000000000400000-0x000000000043D000-memory.dmp

      Filesize

      244KB