Overview
overview
10Static
static
7trojan-lea...35.exe
windows7-x64
8trojan-lea...35.exe
windows10-2004-x64
8trojan-lea...07.exe
windows7-x64
8trojan-lea...07.exe
windows10-2004-x64
8trojan-lea...NT.rar
windows7-x64
3trojan-lea...NT.rar
windows10-2004-x64
3trojan-lea...1).zip
windows7-x64
1trojan-lea...1).zip
windows10-2004-x64
1trojan-lea...ys.exe
windows7-x64
7trojan-lea...ys.exe
windows10-2004-x64
7trojan-lea...0S.z01
windows7-x64
3trojan-lea...0S.z01
windows10-2004-x64
3trojan-lea...0S.z02
windows7-x64
3trojan-lea...0S.z02
windows10-2004-x64
3trojan-lea...0S.z03
windows7-x64
3trojan-lea...0S.z03
windows10-2004-x64
3trojan-lea...0S.zip
windows7-x64
1trojan-lea...0S.zip
windows10-2004-x64
1trojan-lea...er.exe
windows7-x64
3trojan-lea...er.exe
windows10-2004-x64
8trojan-lea...re.zip
windows7-x64
1trojan-lea...re.zip
windows10-2004-x64
1trojan-lea...32.exe
windows7-x64
10trojan-lea...32.exe
windows10-2004-x64
trojan-lea...32.exe
windows7-x64
trojan-lea...32.exe
windows10-2004-x64
trojan-lea...64.exe
windows7-x64
trojan-lea...64.exe
windows10-2004-x64
trojan-lea...ne.exe
windows7-x64
1trojan-lea...ne.exe
windows10-2004-x64
1trojan-lea...64.exe
windows7-x64
1trojan-lea...64.exe
windows10-2004-x64
1Resubmissions
09-05-2023 19:22
230509-x3fn4adg58 1009-05-2023 19:14
230509-xxsrgaff7x 1009-05-2023 19:14
230509-xxr5yadg42 709-05-2023 19:14
230509-xxrt6sff7w 809-05-2023 19:14
230509-xxrjeaff7v 809-05-2023 19:14
230509-xxqxwadg39 709-05-2023 19:14
230509-xxql4sff7t 1009-05-2023 19:14
230509-xxqbcadg38 709-05-2023 19:10
230509-xvl6xadf64 10General
-
Target
trojan-leaks-main.zip
-
Size
501.8MB
-
Sample
230509-x3fn4adg58
-
MD5
5989c04ee5327d6e7185985f4a7fb933
-
SHA1
51826110b35fc7b0984eae57c8e143900b29a38f
-
SHA256
eadaf26df948f0fd541f297e2f0bad435aa4bee5c97e4324ad767dacca77e29d
-
SHA512
089b2cf3836852d52a8b1da951702d2e2101eee915ddfa72bd967123d1a52d98baae6c0f68f2fd24fb4f1a111b8bfcf6cc57421e76a11f5554a80d372e77587e
-
SSDEEP
12582912:4vZS6yP56fA74t343nX8dn++/RNk8nnqKIEX1b62gOZsX:qZS6yDcJ43sd++//k8nnqKI214
Behavioral task
behavioral1
Sample
trojan-leaks-main/0.950095298700035.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
trojan-leaks-main/0.950095298700035.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
trojan-leaks-main/0x07.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
trojan-leaks-main/0x07.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
trojan-leaks-main/AIDS_NT.rar
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
trojan-leaks-main/AIDS_NT.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
trojan-leaks-main/Abantes (1).zip
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
trojan-leaks-main/Abantes (1).zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
trojan-leaks-main/AjarSys.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
trojan-leaks-main/AjarSys.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral11
Sample
trojan-leaks-main/AnCo250S.z01
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
trojan-leaks-main/AnCo250S.z01
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
trojan-leaks-main/AnCo250S.z02
Resource
win7-20230220-en
Behavioral task
behavioral14
Sample
trojan-leaks-main/AnCo250S.z02
Resource
win10v2004-20230220-en
Behavioral task
behavioral15
Sample
trojan-leaks-main/AnCo250S.z03
Resource
win7-20230220-en
Behavioral task
behavioral16
Sample
trojan-leaks-main/AnCo250S.z03
Resource
win10v2004-20230220-en
Behavioral task
behavioral17
Sample
trojan-leaks-main/AnCo250S.zip
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
trojan-leaks-main/AnCo250S.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
trojan-leaks-main/Antivirus_Installer.exe
Resource
win7-20230220-en
Behavioral task
behavioral20
Sample
trojan-leaks-main/Antivirus_Installer.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral21
Sample
trojan-leaks-main/Aramaware.zip
Resource
win7-20230220-en
Behavioral task
behavioral22
Sample
trojan-leaks-main/Aramaware.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral23
Sample
trojan-leaks-main/BUG32.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
trojan-leaks-main/BUG32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
trojan-leaks-main/BaldiTrojan-x32.exe
Resource
win7-20230220-en
Behavioral task
behavioral26
Sample
trojan-leaks-main/BaldiTrojan-x32.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral27
Sample
trojan-leaks-main/BaldiTrojan-x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral28
Sample
trojan-leaks-main/BaldiTrojan-x64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral29
Sample
trojan-leaks-main/Benzene.exe
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
trojan-leaks-main/Benzene.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral31
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral32
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win10v2004-20230220-en
Malware Config
Targets
-
-
Target
trojan-leaks-main/0.950095298700035.exe
-
Size
134KB
-
MD5
aedbbccb355b4b671b260ddae4caf48a
-
SHA1
fac537787c1c197c1eeff3776f18286c93fb62aa
-
SHA256
f87e7c558f070aba0493468837fcc6dacd76e5cc855a7f460c798af6fe8f0120
-
SHA512
09a412edfe005ab34006032fabcf7b12b18c1ff2aafdaa4a551a7da929c866532ff2d544dff55e2d6fbfbb52cca270481c9853652d6299eb077328d52dbee22a
-
SSDEEP
3072:s4/hNEFqgwt4AfLKUM3/oY+IUTzrojcbWy:ARATu3/Agcb
Score8/10-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
trojan-leaks-main/0x07.exe
-
Size
247KB
-
MD5
733eb0ab951ae42a8d8cca413201e428
-
SHA1
640ffb3ee44eb86afaea92e6c5aa158a5d4aafd1
-
SHA256
52d6d769eb474d4138ac31e05634a6ca7a4ebef5920f8356c1cd70d9fa42c2fb
-
SHA512
c7cdf77aa881c5dbb2abf17913dbf645fe88e16fa11fa055392d36ccf936fc43050c48feb631e193fe044123a190f123d2d6ff12234c0ff7c8c7c6e290209d8f
-
SSDEEP
3072:xaWEHnqlm+0FEaJSq6+ouCpk2mpcWJ0r+QNTBfZnazJ9k3kxMC+89+aPyXiwQ9M1:cWCMm8aMldk1cWQRNTBhz3Yz/qc9M1
Score8/10-
Drops file in Drivers directory
-
Possible privilege escalation attempt
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Modifies boot configuration data using bcdedit
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
-
-
Target
trojan-leaks-main/AIDS_NT.rar
-
Size
634KB
-
MD5
6130816a444466d3ef237bfefae80c2c
-
SHA1
bd5e7be0fd74d424191cf9dddf0f6b4e0a2871b0
-
SHA256
52e0a1c02a0378774da69231586464c8c9fee1b36575786b5424fefda2f90418
-
SHA512
e83d352d104eeb89731bc0578384b5265b6270169aa4d198567f87334114850cfd453963891b47d581948a7d2d0e9ba511c5c01b7b6d6835f1b2ca376269182a
-
SSDEEP
12288:iA1HETk8ZRVmIUuSZmnoBXboLNy2f7MnLT9xaUnkLrCO2Hf6Y2A:iUG7YjVZhBXMLNP7oLBAH2/NV
Score3/10 -
-
-
Target
trojan-leaks-main/Abantes (1).zip
-
Size
2.1MB
-
MD5
406aa989db6c5b5cbe736f8aabd73042
-
SHA1
608382d2558191b0b87aaaee3e870569954d538f
-
SHA256
f476cd6127f6607fb58ef10bf36b6c89619f1f7d73cf0bfc1f0215b92135dd34
-
SHA512
42dcc0a3748eeead6b5fd6daf40442dac43e02456557b3167b89800a911f7a896ad4342b03170ce25ced1f3183c46835b1eb2426d2134f2c3e6fc8dfb0d6c315
-
SSDEEP
49152:CwmHvJlpSmfMs2eLLHcSpJdUGwr+2gjhugOpf6C9+VflO2qYVjmV:sHvJlpJkkLLH7pcGaDgJXxmV
Score1/10 -
-
-
Target
trojan-leaks-main/AjarSys.exe
-
Size
5.8MB
-
MD5
0816a1e816f9737a1fd3eaa7493aa075
-
SHA1
682405e63e3cfa28f955ea4eee2890b93fa6414d
-
SHA256
418f6ff813bbbbe5344b9f8fea28948259bcfd28d424f1354289f5071c85d6ca
-
SHA512
640000c30a3c1e8d05bc5383daa405303596b8694e11a17a04a77e3cf0688a887f35a7f8d38ffea89e8a3ba6e36e63c4b39285b83bfffa55e9fab5cc595484a8
-
SSDEEP
98304:wYOgp0AsZKigPWKQ/HVRBH9vYewem9lTTdxlN7/c3DgPY9rT6Bl1tF:wYL0rtC3Q/pdePbH7/0DIYNT6LbF
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
trojan-leaks-main/AnCo250S.z01
-
Size
24.0MB
-
MD5
caf52c6eeabe95f8d3f8f8923a2977d6
-
SHA1
5470d110ef71c8be4341a3f40d066b938b989b5c
-
SHA256
1c94a2385b950919ba3760d551ddba9e471c6706a4b8b26504b1dd048d8abf37
-
SHA512
175417b60d8c40c5761c858199aac5ac308085dcfeb4e4284542d0e2d3b92b4e218eedcae85f0a8e0fe9d1e9c018c05701241b449fd2191088d580de99f80941
-
SSDEEP
393216:kJVfn85zXCJ5P3+ix6+fOigTl1odisR7QLMvLj0qO0SmUVWUdOVi3/dKtrvK9t2P:kWuSj+puodisRkQSmnfs3Kry9ti
Score3/10 -
-
-
Target
trojan-leaks-main/AnCo250S.z02
-
Size
24.0MB
-
MD5
5df1203bb287ca15a9e913cec9ec3880
-
SHA1
1770e794fada020413beefcf188162394160b9be
-
SHA256
7d99de4ee2ceb3f1b04e12aae16f00923fd03f75e16abed8b8941e4d6d1e1eeb
-
SHA512
95c8b215ac7b2a6036965d4d5d31a854b0443a6b9cb339a918322b34ef2cf6a1ad014ff579178ff5ec158f854d1b2866dbb325ae4b0076698a7b328f4b0f97a5
-
SSDEEP
393216:jDbc9ROt8uvFD6QTqzln5OJnrV+ewzYDDm/QudNNpynZoeEnLztCPYQgHRia5Gpu:jvswbTqzl8RcewzYDnmPpQzELzAwbHRx
Score3/10 -
-
-
Target
trojan-leaks-main/AnCo250S.z03
-
Size
24.0MB
-
MD5
fc4da9d715e9fb4f7d358194fad6f107
-
SHA1
34222f1ffb6f76d17fdc6052d5c6b1e0bf658880
-
SHA256
8d2003cf8b225cc2e8f29bf73c232faf5898631171123ff2c8d3f0523ef58ba6
-
SHA512
c8ae7abaa4e15fe58d419870d597dc298219d96562d5405e3c6fc40908e81950e197d6d6978e77c9fdd46cd26e1341ac2dd6315ff196a5b90f52d9efbf70b316
-
SSDEEP
393216:u3SBJFgGJMZXQHOLV7eMzOPLzTtUp7Qu+2qVN+Q/wMdIDc/DaEiTU9GVrQa/HE72:ISpgGJkQHOLV7enuUT+ird6EifrQcHVP
Score3/10 -
-
-
Target
trojan-leaks-main/AnCo250S.zip
-
Size
9.9MB
-
MD5
df853fc57bf707e18a5394d076da98c6
-
SHA1
376cd14b63bbe4d0625e58b62a6eee68539752e5
-
SHA256
fc1d3634589fdd995c90a34dd52b03e62addc5b6e3cdf675c3f3fb4ab1b6ef82
-
SHA512
79eae21480454f2b3cb7286e16285c351967a7948b6e9700ef13d0f6db9ced4885ea9afc732825d7429f607bb5997d58f80c365345025a0db6351dcdc32d0ad5
-
SSDEEP
196608:XvRhjKD6uRcdJ0KgdSy/RMPCRAnSD6b7WbgJzxoGG/xTQuT03DzGp4VFe+3V5d:5geuRNX9C6RYf1oGG50V2pPq5d
Score1/10 -
-
-
Target
trojan-leaks-main/Antivirus_Installer.exe
-
Size
89KB
-
MD5
70ec6f9bec87d67c435a2b8505a72629
-
SHA1
8dae4c1727c73b3c1135b633e4db69e60ed522f1
-
SHA256
1bfef2733f357e531be53b406b65661893b97a8b18a699b6e65f201dd0eeeae8
-
SHA512
4a164019ae25e21007f2678bdf0e002b2e1eee115ddc4e101a909712d2bbaff3987339b6059c9db69988918296692839c47c49da9ca9ff3310a9e0088ab7d56c
-
SSDEEP
1536:X7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfrwFOO:L7DhdC6kzWypvaQ0FxyNTBfrS
Score8/10-
Downloads MZ/PE file
-
-
-
Target
trojan-leaks-main/Aramaware.zip
-
Size
179KB
-
MD5
d46345e6a112048ce7fb0cc1be021119
-
SHA1
86744fb58f947c499650abd9867956ac77dcb333
-
SHA256
fe4252a3a0c952a7bbce8bd9f20e13fbfae6e694989b117947dacc609505a0b6
-
SHA512
249c8ab3adc3cecfcd4d569868e13904a014fb035ba8c24785d17769639a2b938ec8d271373f8c9718f1427def37d0615eb4313aed35127c4abad66fea132203
-
SSDEEP
3072:GLbMP2OQnsmgzcoQicb0US51S5JZLS8GXHpgYyRX8AGTi0kndHJiz0d:GLUJcgz/cb4wvOaYOsAycHd
Score1/10 -
-
-
Target
trojan-leaks-main/BUG32.exe
-
Size
3.0MB
-
MD5
149cc2ec1900cb778afb50d8026eadf5
-
SHA1
a7bc1bbc7bdc970757ec369ef0b51dc53989f131
-
SHA256
817a695e53a1d6e24f2c701751b4d18468f20698f30fada420dfba6e21a09797
-
SHA512
d617654478beb6325d86c108cddaff8f8d658a235d26b8e0282ed85dca826bdb62b0b67e749c7cd421dbae1d98084220e2f4d5779badb8fd7ab07ff333a35553
-
SSDEEP
49152:Or2U5IahDUGN97rkqOAackLjQ0rZEAh3oA6wHE+K60Kk0aCLkfAZKt0OJTcL:4H2ahFNNrg3QbQoA6wHEnFN4IJu
Score10/10-
Modifies WinLogon for persistence
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Modifies system executable filetype association
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
trojan-leaks-main/BaldiTrojan-x32.exe
-
Size
4.2MB
-
MD5
0aeaafa78906f0977c4af8963bcd84c2
-
SHA1
59a4a0e73d646349c4dde83ceb996e20167cfcc0
-
SHA256
822023abab19f62e0b5243390df4639cb7697dac75a323682f7478db477dee24
-
SHA512
82ac5b2e225c30ee4f2197562b77ca1ec1b5c5cd438bf819d3b91adb9cca6421943afdf43b4748a3f9a321c30a274d145e248ac9da5bf76799440612ec13419d
-
SSDEEP
98304:fKgez/S9bL+M0QVtYD0JCqfZlVcc9uNSwfrNaSQMU0qay9jT:uzk0mtyTqj6W4SGYSQcqD9P
Score10/10-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
-
-
Target
trojan-leaks-main/BaldiTrojan-x64.exe
-
Size
4.2MB
-
MD5
e2c4c4dd8c6a357eca164955a8fe040c
-
SHA1
f4114815bce62efbc78c79f9a83ccf74a4ea075c
-
SHA256
f3efe3b57a0f5cc46963dbd8832ceecd5768117685b4cee684b1235d9e74ebe5
-
SHA512
389bf398f9f9f6ae7e6dfca835f5877befa4ebfee5938d4b50728d77fb0450b2eb2cb67e3f4d9abaaad77231754968b27c69a510448dfd7f52c63b1ce3a1c3e1
-
SSDEEP
98304:3c9jNgez/S9bL+M0QVtYD0JCqfZlVcc9uNSwfrNaSQHbfU0qC:s95zk0mtyTqj6W4SGYSQ/qC
Score10/10-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Sets desktop wallpaper using registry
-
-
-
Target
trojan-leaks-main/Benzene.exe
-
Size
55KB
-
MD5
d6e6e2fb2e45c7a2ca6585d86b39d2d0
-
SHA1
0f64d36122ea98d09b504041b5a511dc4a0b5275
-
SHA256
942f4aca0316e529d0b7c721b774f37738fb99d27fb4adc034d08cb31fd72924
-
SHA512
9493b05deed8e0bfdf590c60d7aa7894420b192fdfbd979d321aae9c9cc1d5104fa6125ae8139b12ba1e0c227727375fe046456733c20198f20508321d8adaa1
-
SSDEEP
768:VglgFHa1vlmz3ggcRLgHLT0ztbjZMJfdZjpYwOxF3iCX85:3F69lmzQ5uT0nMJDjKwOxFZ85
Score1/10 -
-
-
Target
trojan-leaks-main/Benzene_x64.exe
-
Size
234KB
-
MD5
4abcf3f7124adbbb7aa59a1f128f5b16
-
SHA1
64e82614e15cd9102f9ab594d05b0c17549b0618
-
SHA256
40d98c6d729f998614934cec341440c11c9cbdfcb7bd9c649d83f915eeac4138
-
SHA512
58a603da4a6a6be5f52fd4e33e87d1dfeb03c8404cf422b7afec0487723c9cf6c34d3b363e684ed9c3e13d8748ec8affeafd8b5e1df88f2393f66275b1b37fde
-
SSDEEP
6144:8cpsByyZtP/Gxqw44Y5yjaGLqSKExm7WWIQ:8cpsBnZ1/GXc5YX2SKExNWf
Score1/10 -
MITRE ATT&CK Enterprise v6
Persistence
Bootkit
1Change Default File Association
1Hidden Files and Directories
1Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Bypass User Account Control
1Disabling Security Tools
1File and Directory Permissions Modification
1Hidden Files and Directories
1Modify Registry
8