Resubmissions

07-07-2023 19:28

230707-x6vx7aah77 10

09-05-2023 07:16

230509-h34zcsgf4w 8

27-03-2023 11:00

230327-m3yjssdb46 10

25-03-2023 07:43

230325-jkn1vsdh4z 8

25-02-2023 11:28

230225-nldnqsda92 10

25-02-2023 11:28

230225-nk69nada89 1

25-02-2023 11:24

230225-nh4qrada83 10

15-01-2023 04:46

230115-fd3c5aab55 10

06-12-2022 18:59

221206-xm59taea79 10

Analysis

  • max time kernel
    380s
  • max time network
    868s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-de
  • resource tags

    arch:x64arch:x86image:win10-20220812-delocale:de-deos:windows10-1703-x64systemwindows
  • submitted
    06-12-2022 18:59

General

  • Target

    fucker script.exe

  • Size

    104KB

  • MD5

    db0655efbe0dbdef1df06207f5cb5b5b

  • SHA1

    a8d48d5c0042ce359178d018c0873e8a7c2f27e8

  • SHA256

    52972a23ab12b95cd51d71741db2cf276749e56030c092e2e4f0907dcb1fbd56

  • SHA512

    5adc8463c3e148a66f8afdeefc31f2b3ffeb12b7641584d1d24306b0898da60a8b9b948bb4f9b7d693185f2daa9bd9437b3b84cebc0eabfa84dfcef6938e1704

  • SSDEEP

    1536:m5iT3FccnYWkyjWpOku3yUyJCbyVAvy7+fRo:3LOcxkyjW3wvHq

Score
1/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\fucker script.exe
    "C:\Users\Admin\AppData\Local\Temp\fucker script.exe"
    1⤵
      PID:2868

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2868-120-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-121-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-122-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-123-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-124-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-125-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-126-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-127-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-128-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-129-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-130-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-131-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-132-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-133-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-134-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-135-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-136-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-137-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-138-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-139-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-140-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-141-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB

    • memory/2868-142-0x0000000076F00000-0x000000007708E000-memory.dmp

      Filesize

      1.6MB