Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-07-2023 16:52

General

  • Target

    Setup.exe

  • Size

    1.1MB

  • MD5

    18e79403815bcb2831d9383c9135edbf

  • SHA1

    cd49506de380658119a1fff1745a98316152f9e6

  • SHA256

    15dc5f309732a5d78c6f0ad0bb77baea4f6dbab4ce7d7bcad655c2ceb6de06fa

  • SHA512

    3a0f2fe4e5445ba0e633da5b3c7832e4af4e2de907a81b0d05cfbf348a41404a83682db86710825215bbfed96cb49ef2e594f973bf37a8abfc499039b1e8e7bb

  • SSDEEP

    6144:9hvWGad/1VqBFJlXdvaIBNJtJSeAOagS5pUGtiHjzk1In/yP3:jG/1VqBfdSedSYGszI

Malware Config

Extracted

Family

redline

Botnet

@kkkllsttnnn

C2

94.142.138.4:80

Attributes
  • auth_value

    c82524415ee633c9f508c7d4bf1d0d29

Extracted

Family

laplas

C2

http://185.209.161.189

Attributes
  • api_key

    f0cd0c3938331a84425c6e784f577ccd87bb667cfdb44cc24f97f402ac5e15b7

Signatures

  • Laplas Clipper

    Laplas is a crypto wallet stealer with three variants written in Golang, C#, and C++.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Loads dropped DLL 6 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4512
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5000
        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe
          4⤵
          • Executes dropped EXE
          PID:1340
      • C:\Users\Admin\AppData\Local\Temp\conhost.exe
        "C:\Users\Admin\AppData\Local\Temp\conhost.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3404
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2352
          • C:\Windows\system32\mode.com
            mode 65,10
            5⤵
              PID:4468
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e file.zip -p14686162772176726463601229733 -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4352
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_5.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4300
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_4.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:2168
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_3.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:3048
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_2.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:1896
            • C:\Users\Admin\AppData\Local\Temp\main\7z.exe
              7z.exe e extracted/file_1.zip -oextracted
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of AdjustPrivilegeToken
              PID:4488
            • C:\Windows\system32\attrib.exe
              attrib +H "BuildMiner.exe"
              5⤵
              • Views/modifies file attributes
              PID:5112
            • C:\Users\Admin\AppData\Local\Temp\main\BuildMiner.exe
              "BuildMiner.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2492
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C powershell -EncodedCommand "PAAjAHcAMgBzAFkAbwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAQwBNAEgAQwBuAGwAVgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB2AEoAbABDAHUAeABEADYAaQBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADIAZgBIAGoAZQA3AEMANgBCACMAPgA=" & powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4672
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  powershell -EncodedCommand "PAAjAHcAMgBzAFkAbwAjAD4AIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAGEAQwBNAEgAQwBuAGwAVgAjAD4AIAAtAEUAeABjAGwAdQBzAGkAbwBuAFAAYQB0AGgAIABAACgAJABlAG4AdgA6AFUAcwBlAHIAUAByAG8AZgBpAGwAZQAsACQAZQBuAHYAOgBTAHkAcwB0AGUAbQBEAHIAaQB2AGUAKQAgADwAIwB2AEoAbABDAHUAeABEADYAaQBiACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjADIAZgBIAGoAZQA3AEMANgBCACMAPgA="
                  7⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3464
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray\NvStrayService_bk2728" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                6⤵
                  PID:5092
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /c SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe"
                  6⤵
                    PID:1972

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oriq0r5g.nq3.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • C:\Users\Admin\AppData\Local\Temp\conhost.exe

          Filesize

          2.5MB

          MD5

          e80403324a8d1bdb20efb9621185b50c

          SHA1

          1205f8a688cb6fc00c59dc69ca11e40ccc327aeb

          SHA256

          8a5e05e3862d00091656ca87d8a89ee9c954cd4c596177c681357686cf6b9e52

          SHA512

          6ffad08e2bdf08d74849048765f91fac957209db4903c7ece7cb2168eb02eb3f50c44a9f59ecbcaeec64f8465f186b2bf26ceafd81fdf84960f2be3aebe2246b

        • C:\Users\Admin\AppData\Local\Temp\conhost.exe

          Filesize

          2.5MB

          MD5

          e80403324a8d1bdb20efb9621185b50c

          SHA1

          1205f8a688cb6fc00c59dc69ca11e40ccc327aeb

          SHA256

          8a5e05e3862d00091656ca87d8a89ee9c954cd4c596177c681357686cf6b9e52

          SHA512

          6ffad08e2bdf08d74849048765f91fac957209db4903c7ece7cb2168eb02eb3f50c44a9f59ecbcaeec64f8465f186b2bf26ceafd81fdf84960f2be3aebe2246b

        • C:\Users\Admin\AppData\Local\Temp\conhost.exe

          Filesize

          2.5MB

          MD5

          e80403324a8d1bdb20efb9621185b50c

          SHA1

          1205f8a688cb6fc00c59dc69ca11e40ccc327aeb

          SHA256

          8a5e05e3862d00091656ca87d8a89ee9c954cd4c596177c681357686cf6b9e52

          SHA512

          6ffad08e2bdf08d74849048765f91fac957209db4903c7ece7cb2168eb02eb3f50c44a9f59ecbcaeec64f8465f186b2bf26ceafd81fdf84960f2be3aebe2246b

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.dll

          Filesize

          1.6MB

          MD5

          72491c7b87a7c2dd350b727444f13bb4

          SHA1

          1e9338d56db7ded386878eab7bb44b8934ab1bc7

          SHA256

          34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

          SHA512

          583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\7z.exe

          Filesize

          458KB

          MD5

          619f7135621b50fd1900ff24aade1524

          SHA1

          6c7ea8bbd435163ae3945cbef30ef6b9872a4591

          SHA256

          344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

          SHA512

          2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

        • C:\Users\Admin\AppData\Local\Temp\main\BuildMiner.exe

          Filesize

          21KB

          MD5

          f07360684834c1bf57e6cd110dc463f9

          SHA1

          3be7e427451db1f9b9f6ea69909c2bd9c6c208b6

          SHA256

          15f6fb4c87fd23e2981871ca9336b45a0b7e1fbc22bd881a588b57305864f728

          SHA512

          7657241670c65fe07c50b1b8aed5701c4fd5870e9695a0b474e6107bf483affbbfc22d9dda342675ffe872906ea16596d88dbbce5f3a2c32ddd5df5110636b5e

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\ANTIAV~1.DAT

          Filesize

          2.1MB

          MD5

          b1835c881ee1c4fb1779e024ce44740e

          SHA1

          db7305c6cc5dacb6ccd83a4b34ffbbe9171630af

          SHA256

          17433d5a57620a0c29679b2001dd3cd68f03d16061c3b58466808b7d308483c9

          SHA512

          4ae6b1049c51e9c7fd6cd76fa26b6b72475afcbeed53da0a37669f32e029a8079254c78b5949b4c5394d3e5efaec68006ac3782c36f3b0edcd586b9793e08ac8

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\BuildMiner.exe

          Filesize

          21KB

          MD5

          f07360684834c1bf57e6cd110dc463f9

          SHA1

          3be7e427451db1f9b9f6ea69909c2bd9c6c208b6

          SHA256

          15f6fb4c87fd23e2981871ca9336b45a0b7e1fbc22bd881a588b57305864f728

          SHA512

          7657241670c65fe07c50b1b8aed5701c4fd5870e9695a0b474e6107bf483affbbfc22d9dda342675ffe872906ea16596d88dbbce5f3a2c32ddd5df5110636b5e

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_1.zip

          Filesize

          9KB

          MD5

          25988fb02c1bd6c5860328a216eeb95c

          SHA1

          286959e5587f441719c8f406f774b8b5bc3bf08d

          SHA256

          30d2fd0544d4b60f99d4149f6307aff4ca0d9ccb360cf49e07fd5f04f5131073

          SHA512

          b0f2f04be00126e0e375b7714dd9b33944a7953fe370411bc7ba651d3a75f5893a2fb16207c8da082b9102ca377b12c6432ab8a5c4e0a8756244647fd880450f

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_2.zip

          Filesize

          9KB

          MD5

          c5a0af267e18b9dfc00147a44ba646ee

          SHA1

          5a3bef653ba78146789662a60aeccdef40136a8f

          SHA256

          486799e877e35e2c68670f5fc9c98fe3bd520b415ee56a03320600d051b4e7fc

          SHA512

          c0ae17b1ffa6198186e7047c734fe28d8596d24a3bfd75de7db8ff1966878da33084868ac74719501bcfa7e7983ff1ec212577e3fc5ae76ea7169479f049aa07

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_3.zip

          Filesize

          9KB

          MD5

          c5d5e934a79b72442bbfb2d7f7ba41f3

          SHA1

          0dc49d100ba9868aa5ec9bc80214312deb5935b1

          SHA256

          8ea7f54761b7c9fe7ee666aa7d75745eb16de3be97baea296a5ad8510fe044ed

          SHA512

          268cf5d3f5a7bd1551f681325a22e77b2851bd6dc47138addddd00176b381804f0d814c2afc93de16a738c9730b92f581681ea4f426aa2992dcaa2b0fec1e26f

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_4.zip

          Filesize

          9KB

          MD5

          fbc59d7680f17050c3a6ffb627473e3a

          SHA1

          95ea63eb12f337a6cfd703c525e43c075ddc6727

          SHA256

          d71989e150caa37e6d2dde351a2c10deeb9f04d93197df46ddca802e98797136

          SHA512

          35bc0e2ef79ee472f278ebdf6591b80123a8ebba1f8f3b2f9d7da8292362a5f2c6ea3908fed15e15e20d5eba8eeff1e32d83dad63a44a7b433dd264d037f97cd

        • C:\Users\Admin\AppData\Local\Temp\main\extracted\file_5.zip

          Filesize

          1.5MB

          MD5

          44c969bf0b7030d8ada1df901c23f82c

          SHA1

          6a5363c6c5926a8be702680490365bd5b2512f54

          SHA256

          339216c0801b39f7e2ae10160a399d8697eb19d291e4d026c152e83df4566bdd

          SHA512

          9659e705627d92504f0dc4624d2ffd3a188451eac6380121ec431b5f56f4c3f7647d8e42b8c0b59d0f1e1d7b49f6c76737d35de3c04bd1df6ecfcd1824e40850

        • C:\Users\Admin\AppData\Local\Temp\main\file.bin

          Filesize

          1.5MB

          MD5

          29db030a9fd4beeaadb30ef7327c3c84

          SHA1

          142dbcdb7b233b2052e21f80bd7fe4573fef3317

          SHA256

          14c01f01b3db41d0e4645bc32580fdba320d80cf851383ba6d9e6956e7869648

          SHA512

          89f8ab37794602d8ff807fda5cc18d511b5935b4fb335d10751b49cac40ec7ea492e439af321963a5ef7c62d1c523f341a677a9e00e09a3cb0099a9ef4c66fab

        • C:\Users\Admin\AppData\Local\Temp\main\main.bat

          Filesize

          480B

          MD5

          e158d52a35f0c4f9787ac74b71acd22c

          SHA1

          e908178e1bb0a891ab65bc89f57e41112759c0c7

          SHA256

          93ff638486b9acb3e07a34b54e2efb4ac6d690c2e4303287b159692e38b71e24

          SHA512

          cb0e29d05786a0351d5d5f0fdeadc53f2ebf2748b311897e064ad8ec9756cd34b5d190fc0aad9abdd6ac880fdb37a93bc4c0f6c86d3ea29d672b5880d7d333f1

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          4.0MB

          MD5

          d076c4b5f5c42b44d583c534f78adbe7

          SHA1

          c35478e67d490145520be73277cd72cd4e837090

          SHA256

          2c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8

          SHA512

          b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          4.0MB

          MD5

          d076c4b5f5c42b44d583c534f78adbe7

          SHA1

          c35478e67d490145520be73277cd72cd4e837090

          SHA256

          2c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8

          SHA512

          b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638

        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

          Filesize

          4.0MB

          MD5

          d076c4b5f5c42b44d583c534f78adbe7

          SHA1

          c35478e67d490145520be73277cd72cd4e837090

          SHA256

          2c63c61e0adaaf669c9c674edfc9081d415c05b834611944a682f120ab9559d8

          SHA512

          b2dfcf98695e7e40578f02a104a1c2fa1de29d13b0056d3dc4a5689168546f437bfd6acbc99e3766f94efb01bac5c908f3e80795f017e1629c97b6b1026ce638

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          850.0MB

          MD5

          b862b3dc3970169f0ccb97e4f53eaeb8

          SHA1

          d03e219be425f81c44520ef40d186f206faff59a

          SHA256

          a1c6785e2411b6e92ff14d75c31cdc0fc6c3472a3e1da292b46f98b1e4be0118

          SHA512

          2a8ada2b93cdc5c2c08306745810bf340f1195842e34a8cd7402cfccfce48eb389bf55f907142b239dc078645a3bb9fd1933582821564cc4cc68974f66e361d1

        • C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe

          Filesize

          850.0MB

          MD5

          b862b3dc3970169f0ccb97e4f53eaeb8

          SHA1

          d03e219be425f81c44520ef40d186f206faff59a

          SHA256

          a1c6785e2411b6e92ff14d75c31cdc0fc6c3472a3e1da292b46f98b1e4be0118

          SHA512

          2a8ada2b93cdc5c2c08306745810bf340f1195842e34a8cd7402cfccfce48eb389bf55f907142b239dc078645a3bb9fd1933582821564cc4cc68974f66e361d1

        • memory/2492-227-0x0000000000F20000-0x0000000000F2C000-memory.dmp

          Filesize

          48KB

        • memory/2492-281-0x0000000005980000-0x0000000005990000-memory.dmp

          Filesize

          64KB

        • memory/2492-229-0x0000000005980000-0x0000000005990000-memory.dmp

          Filesize

          64KB

        • memory/2492-228-0x0000000005940000-0x000000000594A000-memory.dmp

          Filesize

          40KB

        • memory/3464-265-0x0000000007A30000-0x00000000080AA000-memory.dmp

          Filesize

          6.5MB

        • memory/3464-267-0x0000000007460000-0x000000000746A000-memory.dmp

          Filesize

          40KB

        • memory/3464-274-0x0000000007670000-0x0000000007678000-memory.dmp

          Filesize

          32KB

        • memory/3464-273-0x0000000007720000-0x000000000773A000-memory.dmp

          Filesize

          104KB

        • memory/3464-272-0x0000000007630000-0x000000000763E000-memory.dmp

          Filesize

          56KB

        • memory/3464-270-0x0000000007680000-0x0000000007716000-memory.dmp

          Filesize

          600KB

        • memory/3464-268-0x000000007F560000-0x000000007F570000-memory.dmp

          Filesize

          64KB

        • memory/3464-266-0x00000000073F0000-0x000000000740A000-memory.dmp

          Filesize

          104KB

        • memory/3464-262-0x0000000006690000-0x00000000066AE000-memory.dmp

          Filesize

          120KB

        • memory/3464-252-0x0000000070CF0000-0x0000000070D3C000-memory.dmp

          Filesize

          304KB

        • memory/3464-251-0x00000000066B0000-0x00000000066E2000-memory.dmp

          Filesize

          200KB

        • memory/3464-231-0x0000000002B10000-0x0000000002B46000-memory.dmp

          Filesize

          216KB

        • memory/3464-232-0x00000000052C0000-0x00000000058E8000-memory.dmp

          Filesize

          6.2MB

        • memory/3464-234-0x0000000005280000-0x00000000052A2000-memory.dmp

          Filesize

          136KB

        • memory/3464-235-0x0000000002B80000-0x0000000002B90000-memory.dmp

          Filesize

          64KB

        • memory/3464-233-0x0000000002B80000-0x0000000002B90000-memory.dmp

          Filesize

          64KB

        • memory/3464-250-0x0000000002B80000-0x0000000002B90000-memory.dmp

          Filesize

          64KB

        • memory/3464-236-0x0000000005A10000-0x0000000005A76000-memory.dmp

          Filesize

          408KB

        • memory/3464-246-0x00000000060E0000-0x00000000060FE000-memory.dmp

          Filesize

          120KB

        • memory/3608-145-0x000000000A540000-0x000000000AAE4000-memory.dmp

          Filesize

          5.6MB

        • memory/3608-142-0x0000000005D40000-0x0000000005D7C000-memory.dmp

          Filesize

          240KB

        • memory/3608-147-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/3608-146-0x00000000065E0000-0x0000000006646000-memory.dmp

          Filesize

          408KB

        • memory/3608-149-0x000000000B020000-0x000000000B54C000-memory.dmp

          Filesize

          5.2MB

        • memory/3608-139-0x0000000006430000-0x000000000653A000-memory.dmp

          Filesize

          1.0MB

        • memory/3608-148-0x000000000A260000-0x000000000A422000-memory.dmp

          Filesize

          1.8MB

        • memory/3608-140-0x0000000006360000-0x0000000006372000-memory.dmp

          Filesize

          72KB

        • memory/3608-138-0x00000000067E0000-0x0000000006DF8000-memory.dmp

          Filesize

          6.1MB

        • memory/3608-141-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/3608-143-0x0000000005FE0000-0x0000000006056000-memory.dmp

          Filesize

          472KB

        • memory/3608-144-0x0000000006540000-0x00000000065D2000-memory.dmp

          Filesize

          584KB

        • memory/3608-150-0x0000000007C10000-0x0000000007C60000-memory.dmp

          Filesize

          320KB

        • memory/3608-151-0x00000000055A0000-0x00000000055B0000-memory.dmp

          Filesize

          64KB

        • memory/3608-133-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB