Malware Analysis Report

2025-01-03 05:11

Sample ID 230216-nxk7ysha6t
Target 968-115-0x0000000000400000-0x00000000007E4000-memory.dmp
SHA256 eac028f348cb3cdeb795712d4fb401c3aa4c24c2d68ef0dc89e9093c6b58e2ae
Tags
upx bitrat
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

eac028f348cb3cdeb795712d4fb401c3aa4c24c2d68ef0dc89e9093c6b58e2ae

Threat Level: Known bad

The file 968-115-0x0000000000400000-0x00000000007E4000-memory.dmp was found to be: Known bad.

Malicious Activity Summary

upx bitrat

Bitrat family

UPX packed file

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-16 11:46

Signatures

Bitrat family

bitrat

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-16 11:46

Reported

2023-02-16 11:49

Platform

win7-20221111-en

Max time kernel

30s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe"

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-16 11:46

Reported

2023-02-16 11:49

Platform

win10v2004-20220901-en

Max time kernel

91s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe"

Signatures

N/A

Processes

C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe

"C:\Users\Admin\AppData\Local\Temp\968-115-0x0000000000400000-0x00000000007E4000-memory.exe"

Network

Country Destination Domain Proto
US 209.197.3.8:80 tcp
US 2.18.109.224:443 tcp
US 209.197.3.8:80 tcp
US 209.197.3.8:80 tcp

Files

N/A