Resubmissions

07/07/2023, 19:28

230707-x6vx7aah77 10

09/05/2023, 07:16

230509-h34zcsgf4w 8

27/03/2023, 11:00

230327-m3yjssdb46 10

25/03/2023, 07:43

230325-jkn1vsdh4z 8

25/02/2023, 11:28

230225-nldnqsda92 10

25/02/2023, 11:28

230225-nk69nada89 1

25/02/2023, 11:24

230225-nh4qrada83 10

15/01/2023, 04:46

230115-fd3c5aab55 10

06/12/2022, 18:59

221206-xm59taea79 10

Analysis

  • max time kernel
    380s
  • max time network
    887s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-de
  • resource tags

    arch:x64arch:x86image:win10-20220812-delocale:de-deos:windows10-1703-x64systemwindows
  • submitted
    26/10/2022, 06:23

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:4312

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4312-116-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-117-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-118-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-119-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-120-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-121-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-122-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-123-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-125-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-126-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-127-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-124-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-128-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-129-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-130-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-131-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-132-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-133-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-134-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-135-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-136-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-137-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB

    • memory/4312-138-0x0000000077790000-0x000000007791E000-memory.dmp

      Filesize

      1.6MB