General

  • Target

    2023-04-24_733e0f199b91424bb6f4d3baeaea3688_alina_aspxspy_cerber_cobalt-strike_darkcomet_derusbi_dridex_inception_jrat_lazagne_lockbit_mirage_nautilus_neuron_plugx_redleaves_remcos_rurktar_sliver_th3bug_utkonos_wannacry_webshell-shell_winnti_yayih

  • Size

    5.0MB

  • MD5

    733e0f199b91424bb6f4d3baeaea3688

  • SHA1

    84d6360deed9dbd97f1001fe7e4f152bebbcb32c

  • SHA256

    044685b4ab7d6662478a46d8f991da88a69bb8b73c66ce12e48a4570c3a5050f

  • SHA512

    3a9d4d81b0f4a7c859830162f96344b133052fc36896215891cd6a3b94b18faaba239b4b2b878a2e1e1453ed4aba97d4e05ca634fde776e2e4d6822ec18f72dc

  • SSDEEP

    49152:XGbf5gfKJu0zf4R+oUN+edPTPR5Y0Pf/deh/1XwshSLGI/trdxblHK:8FlRm01+j0BA

Malware Config

Signatures

  • Ardamax family
  • Ardamax main executable 1 IoCs
  • Matiex Main payload 1 IoCs
  • Matiex family
  • Metasploit family
  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2023-04-24_733e0f199b91424bb6f4d3baeaea3688_alina_aspxspy_cerber_cobalt-strike_darkcomet_derusbi_dridex_inception_jrat_lazagne_lockbit_mirage_nautilus_neuron_plugx_redleaves_remcos_rurktar_sliver_th3bug_utkonos_wannacry_webshell-shell_winnti_yayih
    .exe windows x86


    Headers

    Sections