Analysis

  • max time kernel
    45s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    28-05-2022 02:00

General

  • Target

    01db498ca06dabda123034895818aadcab386b758e5b468eb9847b83ba001286.exe

  • Size

    299KB

  • MD5

    922d44da95f903811a7c8b463cbda8b7

  • SHA1

    ecf465b073f3ee11810f22868d6ca20f90a31772

  • SHA256

    01db498ca06dabda123034895818aadcab386b758e5b468eb9847b83ba001286

  • SHA512

    3d34b7efa662545945b529a0326680e42e4befefb51747041e41e4e0c09f3e96da766c6cbe8b2d2f88d2ab1314865c6c08a5533a4f62f498bbf92634293fc5cb

Score
10/10

Malware Config

Extracted

Family

arkei

Botnet

Default

C2

http://woor.link/548152.php

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\01db498ca06dabda123034895818aadcab386b758e5b468eb9847b83ba001286.exe
    "C:\Users\Admin\AppData\Local\Temp\01db498ca06dabda123034895818aadcab386b758e5b468eb9847b83ba001286.exe"
    1⤵
      PID:1944

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1944-55-0x00000000002C0000-0x00000000002DF000-memory.dmp

      Filesize

      124KB

    • memory/1944-54-0x0000000000220000-0x0000000000233000-memory.dmp

      Filesize

      76KB

    • memory/1944-56-0x0000000000400000-0x0000000000664000-memory.dmp

      Filesize

      2.4MB

    • memory/1944-57-0x00000000753C1000-0x00000000753C3000-memory.dmp

      Filesize

      8KB

    • memory/1944-58-0x0000000000400000-0x0000000000664000-memory.dmp

      Filesize

      2.4MB