Overview
overview
10Static
static
7trojan-lea...gif.7z
windows10-1703-x64
3trojan-lea...gif.7z
windows7-x64
3trojan-lea...gif.7z
windows10-2004-x64
3trojan-lea...nly.7z
windows10-1703-x64
3trojan-lea...nly.7z
windows7-x64
3trojan-lea...nly.7z
windows10-2004-x64
trojan-lea...ce.rar
windows10-1703-x64
3trojan-lea...ce.rar
windows7-x64
3trojan-lea...ce.rar
windows10-2004-x64
3trojan-lea...ck.zip
windows10-1703-x64
1trojan-lea...ck.zip
windows7-x64
1trojan-lea...ck.zip
windows10-2004-x64
1trojan-lea...or.exe
windows10-1703-x64
trojan-lea...or.exe
windows7-x64
10trojan-lea...or.exe
windows10-2004-x64
trojan-lea...um.exe
windows10-1703-x64
6trojan-lea...um.exe
windows7-x64
6trojan-lea...um.exe
windows10-2004-x64
6trojan-lea...3).rar
windows10-1703-x64
3trojan-lea...3).rar
windows7-x64
3trojan-lea...3).rar
windows10-2004-x64
trojan-lea...eg.exe
windows10-1703-x64
3trojan-lea...eg.exe
windows7-x64
3trojan-lea...eg.exe
windows10-2004-x64
3trojan-lea...um.zip
windows10-1703-x64
1trojan-lea...um.zip
windows7-x64
1trojan-lea...um.zip
windows10-2004-x64
1trojan-lea...er.exe
windows10-1703-x64
3trojan-lea...er.exe
windows7-x64
3trojan-lea...er.exe
windows10-2004-x64
3Resubmissions
09-05-2023 19:22
230509-x3fn4adg58 1009-05-2023 19:14
230509-xxsrgaff7x 1009-05-2023 19:14
230509-xxr5yadg42 709-05-2023 19:14
230509-xxrt6sff7w 809-05-2023 19:14
230509-xxrjeaff7v 809-05-2023 19:14
230509-xxqxwadg39 709-05-2023 19:14
230509-xxql4sff7t 1009-05-2023 19:14
230509-xxqbcadg38 709-05-2023 19:10
230509-xvl6xadf64 10Analysis
-
max time kernel
115s -
max time network
181s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-05-2023 19:14
Behavioral task
behavioral1
Sample
trojan-leaks-main/gif.7z
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
trojan-leaks-main/gif.7z
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
trojan-leaks-main/gif.7z
Resource
win10v2004-20230221-en
Behavioral task
behavioral4
Sample
trojan-leaks-main/gif_GDIOnly.7z
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
trojan-leaks-main/gif_GDIOnly.7z
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
trojan-leaks-main/gif_GDIOnly.7z
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
trojan-leaks-main/hi2.0 source.rar
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
trojan-leaks-main/hi2.0 source.rar
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
trojan-leaks-main/hi2.0 source.rar
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
trojan-leaks-main/missing_pack.zip
Resource
win10-20230220-en
Behavioral task
behavioral11
Sample
trojan-leaks-main/missing_pack.zip
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
trojan-leaks-main/missing_pack.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
trojan-leaks-main/mrsmajor.exe
Resource
win10-20230220-en
Behavioral task
behavioral14
Sample
trojan-leaks-main/mrsmajor.exe
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
trojan-leaks-main/mrsmajor.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
trojan-leaks-main/neptunium.exe
Resource
win10-20230220-en
Behavioral task
behavioral17
Sample
trojan-leaks-main/neptunium.exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
trojan-leaks-main/neptunium.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral19
Sample
trojan-leaks-main/pid8 (pass 123).rar
Resource
win10-20230220-en
Behavioral task
behavioral20
Sample
trojan-leaks-main/pid8 (pass 123).rar
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
trojan-leaks-main/pid8 (pass 123).rar
Resource
win10v2004-20230221-en
Behavioral task
behavioral22
Sample
trojan-leaks-main/skidded/FosMeg.exe
Resource
win10-20230220-en
Behavioral task
behavioral23
Sample
trojan-leaks-main/skidded/FosMeg.exe
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
trojan-leaks-main/skidded/FosMeg.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
trojan-leaks-main/skidded/Moscovium.zip
Resource
win10-20230220-en
Behavioral task
behavioral26
Sample
trojan-leaks-main/skidded/Moscovium.zip
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
trojan-leaks-main/skidded/Moscovium.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
trojan-leaks-main/skidded/Murderer.exe
Resource
win10-20230220-en
Behavioral task
behavioral29
Sample
trojan-leaks-main/skidded/Murderer.exe
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
trojan-leaks-main/skidded/Murderer.exe
Resource
win10v2004-20230220-en
General
-
Target
trojan-leaks-main/skidded/Murderer.exe
-
Size
21.9MB
-
MD5
8a27182879ba66cf5d07940b16bbb5a0
-
SHA1
0242ca81d92cd4ece24bc0f558a269f0baeaa8e2
-
SHA256
887889b8c147adec683a3d5dfa36bae2693b438b27b9b623aea7f16522174e3b
-
SHA512
7d68b338f20610b20e4f72104ae0d5b1abdc82821c606e03e8b2ae307b13ed010acef8eeba4cb1b5eda61ad324b4ff28a84870cc6901bc328ee519e4646432fe
-
SSDEEP
393216:WMT+rfHZlgMMH2RhoAZbBQbCVC9woa4KVbh6wHW8ALe4Lfj16ouWcXD:WZZaMi2R7BQbCVC9wioswHW8AvLZ6ouf
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Murderer.exedescription pid process target process PID 4248 wrote to memory of 4276 4248 Murderer.exe cmd.exe PID 4248 wrote to memory of 4276 4248 Murderer.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\skidded\Murderer.exe"C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\skidded\Murderer.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\System32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\E2C3.tmp\E2C4.tmp\E2C5.bat C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\skidded\Murderer.exe"2⤵PID:4276
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
619B
MD544148f40b305d441d7d685e42cab976c
SHA1de1767b8a6361650932a8c3972cd0fb6fd15416b
SHA256354bcbc57c1e31d2003d80e6c1746a5de844e1b31df9c8b1607ecdeaec18b6f2
SHA5128d2ce47b972724bacb59e5f65d694d2fe8c64a91df1905e16044b2084e5be6c366bb3fdcffb862ffb21acb01dddf9a53c3fbdb37837aeb70c39f70856c67bee7