Overview
overview
6Static
static
1✅stripe ...v3.rar
windows7-x64
3✅stripe ...v3.rar
windows10-2004-x64
3v3/mohoe.py
windows7-x64
3v3/mohoe.py
windows10-2004-x64
3v3/registe...ain.py
windows7-x64
3v3/registe...ain.py
windows10-2004-x64
3v3/registe...to.mp4
windows7-x64
1v3/registe...to.mp4
windows10-2004-x64
6Analysis
-
max time kernel
32s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2023, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
✅stripe any page bypass cvv tool✅v3.rar
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
✅stripe any page bypass cvv tool✅v3.rar
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
v3/mohoe.py
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
v3/mohoe.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
v3/registerlogin/main.py
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
v3/registerlogin/main.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
v3/registerlogin/site/mojito.mp4
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
v3/registerlogin/site/mojito.mp4
Resource
win10v2004-20230703-en
General
-
Target
v3/mohoe.py
-
Size
40KB
-
MD5
3b6624afda561c10c979d2346780a8fc
-
SHA1
87760149075732e66cb9ea5d0cf215a230b2622a
-
SHA256
322975c28e3abfe66fe5cfb71841c027b649bff3da938ce3b687fc06ea9a71ff
-
SHA512
234557d6133d54b5f079356902ba3ca1741a9f39d07af5b923751e160460f5cc7a928a82be52ba13d6d308ceb934de7c63df8fa0bb09d1590a0f3d54cd1f912e
-
SSDEEP
384:zcCUNZ5HargTED6WtpggASQNBdA3GoNZIZKWloK/fUm2ryU1IqYxVlQ35lJZ8kjJ:z5tpDyKyS5p7sQRyy7z6WCVL+d
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1944 OpenWith.exe