Overview
overview
10Static
static
7trojan-lea...64.exe
windows10-1703-x64
1trojan-lea...64.exe
windows7-x64
1trojan-lea...64.exe
windows10-2004-x64
1trojan-lea...er.exe
windows10-1703-x64
trojan-lea...er.exe
windows7-x64
10trojan-lea...er.exe
windows10-2004-x64
trojan-lea...ks.exe
windows10-1703-x64
1trojan-lea...ks.exe
windows7-x64
1trojan-lea...ks.exe
windows10-2004-x64
1trojan-lea...ix.exe
windows10-1703-x64
6trojan-lea...ix.exe
windows7-x64
6trojan-lea...ix.exe
windows10-2004-x64
6trojan-lea...E#.txt
windows10-1703-x64
1trojan-lea...E#.txt
windows7-x64
1trojan-lea...E#.txt
windows10-2004-x64
1trojan-lea...V).exe
windows10-1703-x64
10trojan-lea...V).exe
windows7-x64
10trojan-lea...V).exe
windows10-2004-x64
10trojan-lea...er.zip
windows10-1703-x64
1trojan-lea...er.zip
windows7-x64
1trojan-lea...er.zip
windows10-2004-x64
1trojan-lea...on.zip
windows10-1703-x64
1trojan-lea...on.zip
windows7-x64
1trojan-lea...on.zip
windows10-2004-x64
trojan-lea...23.exe
windows10-1703-x64
1trojan-lea...23.exe
windows7-x64
1trojan-lea...23.exe
windows10-2004-x64
1trojan-lea...n4.zip
windows10-1703-x64
1trojan-lea...n4.zip
windows7-x64
1trojan-lea...n4.zip
windows10-2004-x64
Resubmissions
09-05-2023 19:22
230509-x3fn4adg58 1009-05-2023 19:14
230509-xxsrgaff7x 1009-05-2023 19:14
230509-xxr5yadg42 709-05-2023 19:14
230509-xxrt6sff7w 809-05-2023 19:14
230509-xxrjeaff7v 809-05-2023 19:14
230509-xxqxwadg39 709-05-2023 19:14
230509-xxql4sff7t 1009-05-2023 19:14
230509-xxqbcadg38 709-05-2023 19:10
230509-xvl6xadf64 10Analysis
-
max time kernel
201s -
max time network
424s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
09-05-2023 19:14
Behavioral task
behavioral1
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win7-20230220-en
Behavioral task
behavioral3
Sample
trojan-leaks-main/Benzene_x64.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral4
Sample
trojan-leaks-main/CoViper.exe
Resource
win10-20230220-en
Behavioral task
behavioral5
Sample
trojan-leaks-main/CoViper.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
trojan-leaks-main/CoViper.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
trojan-leaks-main/Cs_Hacks_Free_no_hacks.exe
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
trojan-leaks-main/Cs_Hacks_Free_no_hacks.exe
Resource
win7-20230220-en
Behavioral task
behavioral9
Sample
trojan-leaks-main/Cs_Hacks_Free_no_hacks.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral10
Sample
trojan-leaks-main/Glodrix.exe
Resource
win10-20230220-en
Behavioral task
behavioral11
Sample
trojan-leaks-main/Glodrix.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
trojan-leaks-main/Glodrix.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral13
Sample
trojan-leaks-main/Halloware #READ ME#.txt
Resource
win10-20230220-en
Behavioral task
behavioral14
Sample
trojan-leaks-main/Halloware #READ ME#.txt
Resource
win7-20230220-en
Behavioral task
behavioral15
Sample
trojan-leaks-main/Halloware #READ ME#.txt
Resource
win10v2004-20230220-en
Behavioral task
behavioral16
Sample
trojan-leaks-main/Halloware (BerkayV).exe
Resource
win10-20230220-en
Behavioral task
behavioral17
Sample
trojan-leaks-main/Halloware (BerkayV).exe
Resource
win7-20230220-en
Behavioral task
behavioral18
Sample
trojan-leaks-main/Halloware (BerkayV).exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral19
Sample
trojan-leaks-main/Holzer.zip
Resource
win10-20230220-en
Behavioral task
behavioral20
Sample
trojan-leaks-main/Holzer.zip
Resource
win7-20230220-en
Behavioral task
behavioral21
Sample
trojan-leaks-main/Holzer.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral22
Sample
trojan-leaks-main/HorrorTrojan Special Edition.zip
Resource
win10-20230220-en
Behavioral task
behavioral23
Sample
trojan-leaks-main/HorrorTrojan Special Edition.zip
Resource
win7-20230220-en
Behavioral task
behavioral24
Sample
trojan-leaks-main/HorrorTrojan Special Edition.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral25
Sample
trojan-leaks-main/HorrorTrojan123.exe
Resource
win10-20230220-en
Behavioral task
behavioral26
Sample
trojan-leaks-main/HorrorTrojan123.exe
Resource
win7-20230220-en
Behavioral task
behavioral27
Sample
trojan-leaks-main/HorrorTrojan123.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral28
Sample
trojan-leaks-main/HorrorTrojan4.zip
Resource
win10-20230220-en
Behavioral task
behavioral29
Sample
trojan-leaks-main/HorrorTrojan4.zip
Resource
win7-20230220-en
Behavioral task
behavioral30
Sample
trojan-leaks-main/HorrorTrojan4.zip
Resource
win10v2004-20230220-en
General
-
Target
trojan-leaks-main/Glodrix.exe
-
Size
416KB
-
MD5
766e0dceb95f26a79300e786669fd4c3
-
SHA1
56bd2f5f37d012059e44185a4405332891b8efb6
-
SHA256
a2d0fcecb809ae416d8d532f7eb58505977aeb00c66f0d51b70025946bc599b3
-
SHA512
9cc4ab1466de58815ea48350f5e31135d9acfce87ba58863eb5632b6b56b5b512cae5b9a512b0400f45e982ad711a3c637bd79a3fe721df9ab0e659b8dd2a204
-
SSDEEP
6144:23nEFPjLXbeQHD0wyqwYxKk+CKEEwL1fFx++/BsPZ:EnEFPjLtHvyqwYg3Tsj6
Malware Config
Signatures
-
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
Glodrix.exedescription ioc process File opened for modification \??\PhysicalDrive0 Glodrix.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
AUDIODG.EXEGlodrix.exedescription pid process Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: 33 1804 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1804 AUDIODG.EXE Token: SeShutdownPrivilege 304 Glodrix.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\Glodrix.exe"C:\Users\Admin\AppData\Local\Temp\trojan-leaks-main\Glodrix.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of AdjustPrivilegeToken
PID:304
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1b01⤵
- Suspicious use of AdjustPrivilegeToken
PID:1804