Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-06-2023 23:44

General

  • Target

    Exodus.codes/Exodus (WITH BINDS).exe

  • Size

    5.5MB

  • MD5

    4e135a73b9e053e5554d66bb698744e3

  • SHA1

    38d9d20148a35e7b06a187958d97ec57059e733a

  • SHA256

    4958ae40670c3c748b7e7cd215807a0abff467b9d4fe1377f68549e417f2ce7f

  • SHA512

    c8b8ab349c64d236d2e1cc61f5f124c9051935d05f811ea0a8b26c9341818fdc6641aa8bf5c87d44d861b4921b39289901dda7a8e9b5bc3a891e1c3bb2d502f5

  • SSDEEP

    98304:uGrkFwJNwEYKFbkOUC7ekAD1o1VFkzjH8MpTGzORK2dSc2Y:uOkiJNRNjpI5zruY

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Exodus.codes\Exodus (WITH BINDS).exe
    "C:\Users\Admin\AppData\Local\Temp\Exodus.codes\Exodus (WITH BINDS).exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2196

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2196-133-0x00007FFDA9010000-0x00007FFDA9012000-memory.dmp
    Filesize

    8KB

  • memory/2196-134-0x0000000140000000-0x0000000140956000-memory.dmp
    Filesize

    9.3MB