Behavioral task
behavioral1
Sample
2023-04-19_492af928bf7209037aab62c05b82a75a_alina_aspxspy_cerber_darkcomet_derusbi_dridex_inception_.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023-04-19_492af928bf7209037aab62c05b82a75a_alina_aspxspy_cerber_darkcomet_derusbi_dridex_inception_.exe
Resource
win10v2004-20230221-en
General
-
Target
2023-04-19_492af928bf7209037aab62c05b82a75a_alina_aspxspy_cerber_darkcomet_derusbi_dridex_inception_jrat_lazagne_lockbit_mirage_nautilus_neuron_plugx_redleaves_rurktar_sliver_th3bug_utkonos_wannacry_webshell-shell_winnti_yayih.exe
-
Size
5.0MB
-
MD5
492af928bf7209037aab62c05b82a75a
-
SHA1
c24a6f7736e125620abed012b4545ddeeac0675e
-
SHA256
91caa1fe289cdd8500399b3dcb07a5417223126a8cfd6833ece052acaaeb27f7
-
SHA512
0fbacf27a474203fe2c29e5c62b5c3d86803901a69e5ce538f9c2e09e42a0f7e4faff39eb0ae76a58a53412d49ae31ba86123fb28f28f1912ea54aa372cd48af
-
SSDEEP
49152:3Gbf5gfKJu0zf4R+oUN+edPTPR5Y0Pf/deh/1XwshSLGI/trdxblHK:cFlRm01+j0BA
Malware Config
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
Processes:
resource yara_rule sample family_ardamax -
Matiex Main payload 1 IoCs
Processes:
resource yara_rule sample family_matiex -
Matiex family
-
Metasploit family
-
Snake Keylogger payload 1 IoCs
Processes:
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
XMRig Miner payload 1 IoCs
Processes:
resource yara_rule sample xmrig -
Xmrig family
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
Processes:
resource yara_rule sample pdf_with_link_action
Files
-
2023-04-19_492af928bf7209037aab62c05b82a75a_alina_aspxspy_cerber_darkcomet_derusbi_dridex_inception_jrat_lazagne_lockbit_mirage_nautilus_neuron_plugx_redleaves_rurktar_sliver_th3bug_utkonos_wannacry_webshell-shell_winnti_yayih.exe.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.xray Size: 5.0MB - Virtual size: 5.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE