Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2022 06:06
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220812-en
General
-
Target
tmp.exe
-
Size
7.0MB
-
MD5
90d11bc40e17839b51fcf6a2f0aebb12
-
SHA1
66139f98aa2efbde94c5a6d5b6abd7099b1ac8b7
-
SHA256
cdc6aef29d300c937b80abade4022803e565f3895b697dbcddc11fe36e19d0f5
-
SHA512
27298c219857f990a8cd8920e6380ffcac3d2952690df6b5d88833a085abaca2933a4637b7aeabbe83ed3c069d59895b583eb60950742ae299b718271d82e29b
-
SSDEEP
196608:SmA20NKKI/0BfjFj0U5mEqddH/qW907NKHBk/alv/bgNTtNalBMskBQFs8AbA9mv:ST20NKKI/0BfjFj0U5mEqddH/qW907NE
Malware Config
Extracted
bitrat
1.38
anubisgod.duckdns.org:1440
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
spottifyy
-
install_file
spottifyy.exe
-
tor_process
tor
Extracted
quasar
1.4.0
Yoworld
anubisgod.duckdns.org:1338
ec434dcc-84b6-4a93-9358-be83ce93fef5
-
encryption_key
0411D8B9B23547F86733347B0634010F112E158F
-
install_name
Dlscord.exe
-
log_directory
DlscordLogs
-
reconnect_delay
3000
-
startup_key
Dlscord
-
subdirectory
Dlscord
Signatures
-
Quasar payload 5 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\Yoworld.exe family_quasar C:\Users\Admin\AppData\Roaming\Yoworld.exe family_quasar behavioral2/memory/840-153-0x00000000006C0000-0x000000000098A000-memory.dmp family_quasar C:\Users\Admin\AppData\Roaming\Dlscord\Dlscord.exe family_quasar C:\Users\Admin\AppData\Roaming\Dlscord\Dlscord.exe family_quasar -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\WaZjnQ.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\WaZjnQ.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\WgUvKD.exe aspack_v212_v242 C:\Users\Admin\AppData\Local\Temp\WgUvKD.exe aspack_v212_v242 -
Executes dropped EXE 6 IoCs
Processes:
WaZjnQ.exeBVGExpliot.exeYoworld.exeBitduckspottifynew.exeWgUvKD.exeDlscord.exepid process 3020 WaZjnQ.exe 1580 BVGExpliot.exe 840 Yoworld.exe 4884 Bitduckspottifynew.exe 4340 WgUvKD.exe 4348 Dlscord.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WgUvKD.exeWaZjnQ.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WgUvKD.exe Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation WaZjnQ.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
Bitduckspottifynew.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spottifyy = "C:\\Users\\Admin\\AppData\\Local\\spottifyy\\spottifyy.exe耀" Bitduckspottifynew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spottifyy = "C:\\Users\\Admin\\AppData\\Local\\spottifyy\\spottifyy.exe" Bitduckspottifynew.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spottifyy = "C:\\Users\\Admin\\AppData\\Local\\spottifyy\\spottifyy.exe㤀" Bitduckspottifynew.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
Bitduckspottifynew.exepid process 4884 Bitduckspottifynew.exe 4884 Bitduckspottifynew.exe 4884 Bitduckspottifynew.exe 4884 Bitduckspottifynew.exe -
Drops file in Program Files directory 64 IoCs
Processes:
WaZjnQ.exeWgUvKD.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Microsoft.Photos.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoia.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\SELFCERT.EXE WgUvKD.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\unpack200.exe WaZjnQ.exe File opened for modification C:\Program Files\Mozilla Firefox\firefox.exe WaZjnQ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Cortana.exe WaZjnQ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.549981C3F5F10_1.1911.21713.0_x64__8wekyb3d8bbwe\Win32Bridge.Server.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PPTICO.EXE WgUvKD.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe WgUvKD.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\SoundRec.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ORGCHART.EXE WgUvKD.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Time.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe WgUvKD.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ktab.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\protocolhandler.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\VPREVIEW.EXE WaZjnQ.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe WaZjnQ.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe WaZjnQ.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\java-rmi.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec64.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.71\GoogleUpdateBroker.exe WaZjnQ.exe File opened for modification C:\Program Files\7-Zip\7z.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\javaw.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\orbd.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe WaZjnQ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\kinit.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\schemagen.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\GRAPH.EXE WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\SPREADSHEETCOMPARE.EXE WaZjnQ.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrServicesUpdater.exe WaZjnQ.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\policytool.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\jjs.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Wordconv.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\SmartTagInstall.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\tnameserv.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\bin\rmid.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PDFREFLOW.EXE WaZjnQ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Maps.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\rmiregistry.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSOSYNC.EXE WaZjnQ.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe WgUvKD.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{9FE34FF4-CC04-4D7E-96B4-2FFAA3FF5050}\chrome_installer.exe WgUvKD.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jsadebugd.exe WaZjnQ.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\Addons\OneDriveSetup.exe WgUvKD.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\msoadfsb.exe WgUvKD.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\WhatsNew.Store.exe WaZjnQ.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\lib\nbexec.exe WaZjnQ.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe WgUvKD.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe WaZjnQ.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\codecpacks.webp.exe WgUvKD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 5060 schtasks.exe 3776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exeBVGExpliot.exepowershell.exepid process 4540 powershell.exe 1580 BVGExpliot.exe 4540 powershell.exe 3172 powershell.exe 3172 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
Yoworld.exepowershell.exeBVGExpliot.exeBitduckspottifynew.exeDlscord.exepowershell.exedescription pid process Token: SeDebugPrivilege 840 Yoworld.exe Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 1580 BVGExpliot.exe Token: SeShutdownPrivilege 4884 Bitduckspottifynew.exe Token: SeDebugPrivilege 4348 Dlscord.exe Token: SeDebugPrivilege 3172 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Bitduckspottifynew.exeDlscord.exepid process 4884 Bitduckspottifynew.exe 4884 Bitduckspottifynew.exe 4348 Dlscord.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
tmp.execmd.execmd.execmd.execmd.exeBitduckspottifynew.exeYoworld.exeWgUvKD.exeDlscord.exeWaZjnQ.exedescription pid process target process PID 5048 wrote to memory of 3020 5048 tmp.exe WaZjnQ.exe PID 5048 wrote to memory of 3020 5048 tmp.exe WaZjnQ.exe PID 5048 wrote to memory of 3020 5048 tmp.exe WaZjnQ.exe PID 5048 wrote to memory of 4916 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 4916 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 4916 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1760 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1760 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1760 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 4900 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 4900 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 4900 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 716 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 716 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 716 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1824 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1824 5048 tmp.exe cmd.exe PID 5048 wrote to memory of 1824 5048 tmp.exe cmd.exe PID 4916 wrote to memory of 4540 4916 cmd.exe powershell.exe PID 4916 wrote to memory of 4540 4916 cmd.exe powershell.exe PID 4916 wrote to memory of 4540 4916 cmd.exe powershell.exe PID 4900 wrote to memory of 1580 4900 cmd.exe BVGExpliot.exe PID 4900 wrote to memory of 1580 4900 cmd.exe BVGExpliot.exe PID 1824 wrote to memory of 840 1824 cmd.exe Yoworld.exe PID 1824 wrote to memory of 840 1824 cmd.exe Yoworld.exe PID 716 wrote to memory of 4884 716 cmd.exe Bitduckspottifynew.exe PID 716 wrote to memory of 4884 716 cmd.exe Bitduckspottifynew.exe PID 716 wrote to memory of 4884 716 cmd.exe Bitduckspottifynew.exe PID 4884 wrote to memory of 4340 4884 Bitduckspottifynew.exe WgUvKD.exe PID 4884 wrote to memory of 4340 4884 Bitduckspottifynew.exe WgUvKD.exe PID 4884 wrote to memory of 4340 4884 Bitduckspottifynew.exe WgUvKD.exe PID 840 wrote to memory of 5060 840 Yoworld.exe schtasks.exe PID 840 wrote to memory of 5060 840 Yoworld.exe schtasks.exe PID 840 wrote to memory of 4348 840 Yoworld.exe Dlscord.exe PID 840 wrote to memory of 4348 840 Yoworld.exe Dlscord.exe PID 4340 wrote to memory of 1204 4340 WgUvKD.exe cmd.exe PID 4340 wrote to memory of 1204 4340 WgUvKD.exe cmd.exe PID 4340 wrote to memory of 1204 4340 WgUvKD.exe cmd.exe PID 4348 wrote to memory of 3776 4348 Dlscord.exe schtasks.exe PID 4348 wrote to memory of 3776 4348 Dlscord.exe schtasks.exe PID 4916 wrote to memory of 3172 4916 cmd.exe powershell.exe PID 4916 wrote to memory of 3172 4916 cmd.exe powershell.exe PID 4916 wrote to memory of 3172 4916 cmd.exe powershell.exe PID 3020 wrote to memory of 928 3020 WaZjnQ.exe cmd.exe PID 3020 wrote to memory of 928 3020 WaZjnQ.exe cmd.exe PID 3020 wrote to memory of 928 3020 WaZjnQ.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\WaZjnQ.exeC:\Users\Admin\AppData\Local\Temp\WaZjnQ.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0c44492d.bat" "3⤵PID:928
-
C:\Windows\SysWOW64\cmd.execmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\Trace eraser.reg2⤵PID:1760
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\BVGExpliot.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\BVGExpliot.exeC:\Users\Admin\AppData\Local\Temp\BVGExpliot.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\Bitduckspottifynew.exe2⤵
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Roaming\Bitduckspottifynew.exeC:\Users\Admin\AppData\Roaming\Bitduckspottifynew.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Roaming\Yoworld.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Roaming\Yoworld.exeC:\Users\Admin\AppData\Roaming\Yoworld.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Dlscord" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Yoworld.exe" /rl HIGHEST /f4⤵
- Creates scheduled task(s)
PID:5060 -
C:\Users\Admin\AppData\Roaming\Dlscord\Dlscord.exe"C:\Users\Admin\AppData\Roaming\Dlscord\Dlscord.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Dlscord" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Dlscord\Dlscord.exe" /rl HIGHEST /f5⤵
- Creates scheduled task(s)
PID:3776
-
C:\Users\Admin\AppData\Local\Temp\WgUvKD.exeC:\Users\Admin\AppData\Local\Temp\WgUvKD.exe1⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\33d8281d.bat" "2⤵PID:1204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD546705f60c103b0f39c2ae236ef33845b
SHA184d855cb4a0a6a6c37fbd91b2983dcbea9d0b181
SHA2565afcbec5b7f7cc02c958895076a045d8bcc2bad417701810bc5e03f6d80b33d8
SHA5124d6752f0127546832f59f102f89e5f26ed13ea7ab43bfcaf94c641b743a1cf77f4b01e4950baa01ffe4a26305acb55ed376be5cf6baea947a1b11e3605fc10f8
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5628011eae8aec4d84ccd4e14896cf16d
SHA1b505231cedd8828941eea6bfbfd6aecfb39ba51b
SHA256c7056131a5b458589e814bfe64a0a345c9afd724df7d5c44866bdbb131acd35b
SHA512e865fd897018edb82ff46085a7c814c2c4d36b5a45e8a07f03fb9bb4762cd22070a062a714c4e432abd00cba4693d1f9c463cc8d6c8d9500ee71ad5255394cd7
-
Filesize
187B
MD58dd9e983ccd13cb6ed5cda3d37068680
SHA1d206d22de97245ff324bddd92c559397a08b7b8d
SHA256a1fea63717f5e2567ca10fb8bd6cc8ad40826d3a1c7754567c0d7e0bbaf48845
SHA512ef2ca6b2fa5708cf71955fff7f3373a6e58d80e7e8ab4cf2ce46718e5fff832c006ac22d58bdc0e4b77f6c58d56598166ed3927d878b56054b16b5de1e624fdb
-
Filesize
187B
MD58f645ca050adbdf872a905d74dd354ea
SHA14b748a9a9cf569e040fbbece46af3bd9910f10f6
SHA256e4707bd27c2cfee134253d434fdf7a52862ee9ebb57a473b772286df7c47456c
SHA512ea15ef29e86a8a344d4049b7812c17d14e7999bbeeb8c57ddfd1748a79609d5a460875c512fa093e54a9a3c830e536c0482b1bb084d4e8e76d56057fd96a4eb6
-
Filesize
379KB
MD51a57ddbff38a587a70eb6b79cd2601e6
SHA1aa72d592d8f70bd4ae1548c52faca921f57ea784
SHA256d4de9c0be13c02b5a6efad6befb3b27c25fc3adcd1116dc05672e859a9d4e4cc
SHA51254a91c427a112227a94fa388e0502c75f8b494e7cec42eafbea87e0c7cefdd7f546cf788fc2714a7750c1f11aad4f48be5377f394d26be9e731ca147a0d79d8c
-
Filesize
379KB
MD51a57ddbff38a587a70eb6b79cd2601e6
SHA1aa72d592d8f70bd4ae1548c52faca921f57ea784
SHA256d4de9c0be13c02b5a6efad6befb3b27c25fc3adcd1116dc05672e859a9d4e4cc
SHA51254a91c427a112227a94fa388e0502c75f8b494e7cec42eafbea87e0c7cefdd7f546cf788fc2714a7750c1f11aad4f48be5377f394d26be9e731ca147a0d79d8c
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
15KB
MD556b2c3810dba2e939a8bb9fa36d3cf96
SHA199ee31cd4b0d6a4b62779da36e0eeecdd80589fc
SHA2564354970ccc7cd6bb16318f132c34f6a1b3d5c2ea7ff53e1c9271905527f2db07
SHA51227812a9a034d7bd2ca73b337ae9e0b6dc79c38cfd1a2c6ac9d125d3cc8fa563c401a40d22155811d5054e5baa8cf8c8e7e03925f25fa856a9ba9dea708d15b4e
-
Filesize
3.8MB
MD5d208502b720a4c00ae55379a1adff4fe
SHA1e2c71e9ba414e0070992a9d31e73c9203b48e876
SHA2560872edd378b3fe1c0f7f5754b8716306291632836040f888bdf1ef87e4d512b4
SHA512a3295a755d0134246ce726a17b332ab844c4e54a0ac1c30c5ee24d17f20319422bfb1d20a22a8c70cb4b88e3758ae47ca6a1ae40d7d80819b0f3aab922a65363
-
Filesize
3.8MB
MD5d208502b720a4c00ae55379a1adff4fe
SHA1e2c71e9ba414e0070992a9d31e73c9203b48e876
SHA2560872edd378b3fe1c0f7f5754b8716306291632836040f888bdf1ef87e4d512b4
SHA512a3295a755d0134246ce726a17b332ab844c4e54a0ac1c30c5ee24d17f20319422bfb1d20a22a8c70cb4b88e3758ae47ca6a1ae40d7d80819b0f3aab922a65363
-
Filesize
2.8MB
MD58df0a6df45fc592b75ac6b99b2093c88
SHA163b0688d48a9fb81a87d81d4a523854428a526af
SHA25682c6a9a76749761515dc8bc59f127a6b5f3155f8cb4c79dd378478483623c587
SHA512f5360f6aaccdf31362327707bf6f337611ac22fb0a7f4fe279f8ec023fb5939dca8fabacd2fd9354197e9d99e5d9fe1f90025302e6f08301fb5df2cbfc81a9db
-
Filesize
2.8MB
MD58df0a6df45fc592b75ac6b99b2093c88
SHA163b0688d48a9fb81a87d81d4a523854428a526af
SHA25682c6a9a76749761515dc8bc59f127a6b5f3155f8cb4c79dd378478483623c587
SHA512f5360f6aaccdf31362327707bf6f337611ac22fb0a7f4fe279f8ec023fb5939dca8fabacd2fd9354197e9d99e5d9fe1f90025302e6f08301fb5df2cbfc81a9db
-
Filesize
2.8MB
MD58df0a6df45fc592b75ac6b99b2093c88
SHA163b0688d48a9fb81a87d81d4a523854428a526af
SHA25682c6a9a76749761515dc8bc59f127a6b5f3155f8cb4c79dd378478483623c587
SHA512f5360f6aaccdf31362327707bf6f337611ac22fb0a7f4fe279f8ec023fb5939dca8fabacd2fd9354197e9d99e5d9fe1f90025302e6f08301fb5df2cbfc81a9db
-
Filesize
2.8MB
MD58df0a6df45fc592b75ac6b99b2093c88
SHA163b0688d48a9fb81a87d81d4a523854428a526af
SHA25682c6a9a76749761515dc8bc59f127a6b5f3155f8cb4c79dd378478483623c587
SHA512f5360f6aaccdf31362327707bf6f337611ac22fb0a7f4fe279f8ec023fb5939dca8fabacd2fd9354197e9d99e5d9fe1f90025302e6f08301fb5df2cbfc81a9db