Analysis

  • max time kernel
    37s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    02/09/2023, 11:37

General

  • Target

    JC_7935915b17c3418aa1eea62820b97048e96e274c4e596bfbbe961b7b763a729d.exe

  • Size

    1.4MB

  • MD5

    a4904bf1d132f3ae81bd3123c0f0a3af

  • SHA1

    e36a465acea3efcc8ecb414414808a40de3c8d1a

  • SHA256

    7935915b17c3418aa1eea62820b97048e96e274c4e596bfbbe961b7b763a729d

  • SHA512

    ee243b2b127c7b02051dc339dbec6110abc841d8c50e07d201e55914c7a66738d613f8370fec2f5bd6e2da53f8ae1051a6afcf710405dbce992e8f091ab1f8bf

  • SSDEEP

    24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk

Malware Config

Extracted

Family

quasar

Version

1.3.0.0

Botnet

-

C2

94.131.105.161:12344

Mutex

QSR_MUTEX_UEgITWnMKnRP3EZFzK

Attributes
  • encryption_key

    5Q0JQBQQfAUHRJTcAIOF

  • install_name

    lient.exe

  • log_directory

    Lugs

  • reconnect_delay

    3000

  • startup_key

    itartup

  • subdirectory

    SubDir

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar payload 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 2 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 3 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 46 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JC_7935915b17c3418aa1eea62820b97048e96e274c4e596bfbbe961b7b763a729d.exe
    "C:\Users\Admin\AppData\Local\Temp\JC_7935915b17c3418aa1eea62820b97048e96e274c4e596bfbbe961b7b763a729d.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup myip.opendns.com. resolver1.opendns.com
          4⤵
            PID:2476
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2584
          • C:\Windows\SysWOW64\Wbem\WMIC.exe
            wmic ComputerSystem get Domain
            4⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:2756
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2468
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2280
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2728
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionPath "$Env:SystemDrive\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:788
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          Powershell -Command 'Add-MpPreference -ExclusionProcess "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2016
        • C:\Users\Admin\AppData\Local\Temp\7z.exe
          7z.exe x -o"C:\Users\Admin\AppData\Local\Temp" -y ratt.7z
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1196
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -executionpolicy RemoteSigned -WindowStyle Hidden -file Add.ps1
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1900
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=in action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2072
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall firewall add rule name=SecuritySystem dir=out action=allow "program=C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" enable=yes
            4⤵
            • Modifies Windows Firewall
            PID:2932
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe"
            4⤵
              PID:3044
              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                wmic computersystem where name="GPFFWLPI" set AutomaticManagedPagefile=False
                5⤵
                  PID:2112
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe"
                4⤵
                  PID:2364
                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                    wmic pagefileset where name="C:\\pagefile.sys" set InitialSize=15000,MaximumSize=20000
                    5⤵
                      PID:1804
                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe
                    "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                    4⤵
                      PID:2156
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd" /c ping 127.0.0.1 -n 7 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                        5⤵
                          PID:1436
                          • C:\Windows\SysWOW64\PING.EXE
                            ping 127.0.0.1 -n 7
                            6⤵
                            • Runs ping.exe
                            PID:1652
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                            6⤵
                              PID:2140
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd" /c ping 127.0.0.1 -n 15 > nul && copy "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 15 > nul && "C:\Users\Admin\Music\rot.exe"
                            5⤵
                              PID:3016
                              • C:\Windows\SysWOW64\PING.EXE
                                ping 127.0.0.1 -n 15
                                6⤵
                                • Runs ping.exe
                                PID:2416
                          • C:\Windows\SysWOW64\attrib.exe
                            "C:\Windows\system32\attrib.exe" +h "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe"
                            4⤵
                            • Views/modifies file attributes
                            PID:1236
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "ratt" /t REG_SZ /d "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe" /F
                          3⤵
                            PID:1776
                          • C:\Users\Admin\AppData\Local\Temp\ratt.exe
                            "ratt.exe"
                            3⤵
                              PID:1456
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd" /c ping 127.0.0.1 -n 8 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                                4⤵
                                  PID:2168
                                  • C:\Windows\SysWOW64\PING.EXE
                                    ping 127.0.0.1 -n 8
                                    5⤵
                                    • Runs ping.exe
                                    PID:2432
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\Music\rot.exe,"
                                    5⤵
                                      PID:284
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd" /c ping 127.0.0.1 -n 20 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ratt.exe" "C:\Users\Admin\Music\rot.exe" && ping 127.0.0.1 -n 20 > nul && "C:\Users\Admin\Music\rot.exe"
                                    4⤵
                                      PID:1620
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping 127.0.0.1 -n 20
                                        5⤵
                                        • Runs ping.exe
                                        PID:864
                                      • C:\Windows\SysWOW64\PING.EXE
                                        ping 127.0.0.1 -n 20
                                        5⤵
                                        • Runs ping.exe
                                        PID:1692
                                      • C:\Users\Admin\Music\rot.exe
                                        "C:\Users\Admin\Music\rot.exe"
                                        5⤵
                                          PID:2272
                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
                                            6⤵
                                              PID:1144

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ratt.exe

                                    Filesize

                                    242.5MB

                                    MD5

                                    d74fc558fd4caa0f50978f3dc54e4fd4

                                    SHA1

                                    1d0efcd9a0fc2dfdb5fb6deb84f6da5e5bb3ab61

                                    SHA256

                                    a89b6ac75f50706a831e2a6fab4c8f6c4b5d2b0716dfe13b49b9b5583fc37a18

                                    SHA512

                                    1fb1b07597cfe48c953166d28270846e2a34090fc814631a2678eec1bdda8f0492015bc5782019d5fd725c510bf8f5be4a735ce39f7f0fb03f3091f413bba1e6

                                  • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe

                                    Filesize

                                    244.0MB

                                    MD5

                                    66269a57ae642e86063daa4212c64053

                                    SHA1

                                    a0f5267477619120c86a53ff13a3813c65814036

                                    SHA256

                                    18d9d828289792630414c534d66cf9b85e8c15d35e5799c2be7616c9ed2e9994

                                    SHA512

                                    17941dba819ab90473925af241beabcbeb60406f2f3b1391737c7910d05f18332b80b3b077dc2c906836aeb8e2c9cfa56102b9dfaae53f338664f5a898434569

                                  • C:\Users\Admin\AppData\Local\Temp\7z.dll

                                    Filesize

                                    328KB

                                    MD5

                                    15bbbe562f9be3e5dcbb834e635cc231

                                    SHA1

                                    7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                                    SHA256

                                    ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                                    SHA512

                                    769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

                                  • C:\Users\Admin\AppData\Local\Temp\7z.exe

                                    Filesize

                                    71KB

                                    MD5

                                    8ba2e41b330ae9356e62eb63514cf82e

                                    SHA1

                                    8dc266467a5a0d587ed0181d4344581ef4ff30b2

                                    SHA256

                                    ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                                    SHA512

                                    2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

                                  • C:\Users\Admin\AppData\Local\Temp\7z.exe

                                    Filesize

                                    71KB

                                    MD5

                                    8ba2e41b330ae9356e62eb63514cf82e

                                    SHA1

                                    8dc266467a5a0d587ed0181d4344581ef4ff30b2

                                    SHA256

                                    ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                                    SHA512

                                    2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

                                  • C:\Users\Admin\AppData\Local\Temp\Add.ps1

                                    Filesize

                                    1KB

                                    MD5

                                    0df43097e0f0acd04d9e17fb43d618b9

                                    SHA1

                                    69b3ade12cb228393a93624e65f41604a17c83b6

                                    SHA256

                                    c8e4a63337a25f55f75ad10ab2b420d716bad4b35a2044fd39dcd5936419d873

                                    SHA512

                                    01ae71dd2ee040baad6f4b9afcfbaeca2b9f6cc7d60ade5de637238d65c17d74292734666f4ae6b533f6bf1007c46387d8e690d97c3b7a535bcd6f216e70c4fb

                                  • C:\Users\Admin\AppData\Local\Temp\ratt.7z

                                    Filesize

                                    693KB

                                    MD5

                                    7de6fdf3629c73bf0c29a96fa23ae055

                                    SHA1

                                    dcb37f6d43977601c6460b17387a89b9e4c0609a

                                    SHA256

                                    069979bfb2aefe3cac239fe4f2477672eb75b90c9853fb67b2ac1438f2ec44ff

                                    SHA512

                                    d1ef2299aacf429572fd6df185009960e601e49126f080fdced26ec407e5db86eaa902e474635464aac146b7de286667a398f2c5e46c4a821dad2579bfb3acf8

                                  • C:\Users\Admin\AppData\Local\Temp\ratt.bat

                                    Filesize

                                    1KB

                                    MD5

                                    7ea1fec84d76294d9256ae3dca7676b2

                                    SHA1

                                    1e335451d1cbb6951bc77bf75430f4d983491342

                                    SHA256

                                    9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

                                    SHA512

                                    ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

                                  • C:\Users\Admin\AppData\Local\Temp\ratt.bat

                                    Filesize

                                    1KB

                                    MD5

                                    7ea1fec84d76294d9256ae3dca7676b2

                                    SHA1

                                    1e335451d1cbb6951bc77bf75430f4d983491342

                                    SHA256

                                    9a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940

                                    SHA512

                                    ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317

                                  • C:\Users\Admin\AppData\Local\Temp\ratt.exe

                                    Filesize

                                    204.1MB

                                    MD5

                                    bfaa90d657fdaedc22b7e5492a45d4e7

                                    SHA1

                                    075e3111095aaf43d0a79d9f41e4f8a35ccf9c2a

                                    SHA256

                                    ac781aebaa5b8890b489d9611b087a6a4838cc4479d3aa86e351eaec6b1cfdd1

                                    SHA512

                                    54e50d27208c204cec1cdbd2ca23a10d327c9e01f3fcbf9688072d7ba3b9fb60a626504c006ff76ba88c258a892361633a06800d6d42da5e10430f94bf25262b

                                  • C:\Users\Admin\AppData\Local\Temp\ratt.exe

                                    Filesize

                                    484.6MB

                                    MD5

                                    eb9d569f88af3d7a7e351fc17f822a20

                                    SHA1

                                    a5aea54c5d35badff767c99d72d8c7b5711b5e32

                                    SHA256

                                    da918b54a2ceeb087f87f92984c1c9eb679cd883547406098ffb653c168c7467

                                    SHA512

                                    a9ea46d4ce5986248dae007ae8b8bb3e516e8bc53512472fa15d1ee273cf22edb4174e6370569882eec565ebc7cdfb23744b29abacae13433567fc46d1363b3d

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MC39G4F52UESD6HD8DIR.temp

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

                                    Filesize

                                    7KB

                                    MD5

                                    bf76a1ab4773581f91cd2640c79f0c99

                                    SHA1

                                    cafb626447d32d5f64226a52d4e20d6fb4c99e96

                                    SHA256

                                    7ea2d858532d0da6c8a78de721952d7326ef1c15667ede7b6d410613143c34aa

                                    SHA512

                                    e9532a176e3b4d54e42e9e2eed1fc2b564cac25954836ffc38c97295fd21aa56b097495379ed6d94c9aa60a63f8e311b99ca7ae5454b8f379a7d8035e689df21

                                  • C:\Users\Admin\Music\rot.exe

                                    Filesize

                                    84.9MB

                                    MD5

                                    b0e3bf3b2b99ad1c880dd1334e5f3c98

                                    SHA1

                                    3dac0b38a4deaf50e049fa5106f19593b8351d7f

                                    SHA256

                                    63233150683f327b5a00475be070a01b3343abe7498d584a9689339ca7c88864

                                    SHA512

                                    b4829d21862bfac45067f44dd7baec37bd82d090ee44be3e42c0fadbb0b5c4f2e9062114392404af3b59002a126c93c2085d7106cd4811d55794d5643b0f4051

                                  • C:\Users\Admin\Music\rot.exe

                                    Filesize

                                    40.9MB

                                    MD5

                                    fca803f8b0646ba513f07a8d2181431a

                                    SHA1

                                    7077e22e427417c201a5aee8353abe91ca89f8d5

                                    SHA256

                                    2cd3915114cf5d3187e69ba7860cdbb38682b715925c0ba60ef5e4a2bf42a2a6

                                    SHA512

                                    481d150eb4efb2cf6f38298cbd10cff03f0b5fcc383eb13916d3f893240ecdd5e59b98c854e9fd0b0b2ff34f03d350dd1170f12666108b135ad906d77f2ce597

                                  • C:\Users\Admin\Music\rot.exe

                                    Filesize

                                    37.6MB

                                    MD5

                                    0d6f8bc7c76099a242f0eea602614c21

                                    SHA1

                                    d480b265703fba490c86ec9d8213dd44807f608c

                                    SHA256

                                    d48e567a16d58d2fd5c8b58312fca51056cf6a376b8b62120b9fe3c6be2bed33

                                    SHA512

                                    e0315b79c362ad7f9348aee9b27673f6a19f77e35a482f08bccc4a666c935f867581f49efca1579caa4a51a607d9f7921fc805bbef5d751c082c7860645e0a0a

                                  • \ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\ratt.exe

                                    Filesize

                                    243.9MB

                                    MD5

                                    7b3a030612b8874af265af8b68579136

                                    SHA1

                                    5e887dd1358ff07261995216c722155f2c04fca0

                                    SHA256

                                    0c6b75581f0693c612e90e4672e5cf35e38c18eb17692efcd1bad7f56a1f7c9e

                                    SHA512

                                    858e9f677fc228e6e7063142e28f35db4ec1d70c0e4a79583b0fd8ccceabf05acefdb62ce201844564f02b4731d33b793d86c03bf8ed5060fd7f5e6f71858409

                                  • \Users\Admin\AppData\Local\Temp\7z.dll

                                    Filesize

                                    328KB

                                    MD5

                                    15bbbe562f9be3e5dcbb834e635cc231

                                    SHA1

                                    7c01cf5fa4db2312c5ed2f7b8c41e3e5c346a51a

                                    SHA256

                                    ed50ef8e0b6dd83fb0c3f733329d4aa6e5a3beb3491e2ba9d2ae206813508dde

                                    SHA512

                                    769287951b8c16f4b10c1b58e82612844babe7b5c10445fe848d713fb5e8321bcbbd9780e9c564cffe35ea4144e8a7e19645291c4eea372fcaa19ae395a97287

                                  • \Users\Admin\AppData\Local\Temp\7z.exe

                                    Filesize

                                    71KB

                                    MD5

                                    8ba2e41b330ae9356e62eb63514cf82e

                                    SHA1

                                    8dc266467a5a0d587ed0181d4344581ef4ff30b2

                                    SHA256

                                    ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                                    SHA512

                                    2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

                                  • \Users\Admin\AppData\Local\Temp\7z.exe

                                    Filesize

                                    71KB

                                    MD5

                                    8ba2e41b330ae9356e62eb63514cf82e

                                    SHA1

                                    8dc266467a5a0d587ed0181d4344581ef4ff30b2

                                    SHA256

                                    ea2ad8d87b79c8eb3952498c7005a195986436cfd7ca7736dbbdda979142daea

                                    SHA512

                                    2fdfc2d368c70320b3dac00fef06381ef90a2a82a1f3137109b033d84e5b70185039af6ec918012dc03bc9d046cd8d8aee3247ba0f59d394e78f1f73380f7a1d

                                  • \Users\Admin\AppData\Local\Temp\ratt.exe

                                    Filesize

                                    190.4MB

                                    MD5

                                    c0a95f3fd8ad01c33ac7feefb3e2480d

                                    SHA1

                                    8bc664c6aac67da9bee5f3d92efcc1f62d2199f6

                                    SHA256

                                    1fef62f8295559bcd0559b4d726e7e0635aa56e07b38a6e8fbc77a4f05566387

                                    SHA512

                                    a8524a235164cebff88e98be1c308510a84cf62b1d108a04b0dd553648ac6c4fd553b601de14ca978ba07e2629c80f46a24a53d64782912353eaccc13224e46e

                                  • \Users\Admin\Music\rot.exe

                                    Filesize

                                    37.0MB

                                    MD5

                                    edf69d3ee7eb6cc3f775f093750f41a4

                                    SHA1

                                    c31e753a5efbc24a8ab944838ac48ddd7cc8f9e4

                                    SHA256

                                    b6a64b5d8344edc3fecfc950a51599913a39608339eeda1d0cfb528147238285

                                    SHA512

                                    944c007365e9aebe07865fc2da3eca7437193f9417394b211073e02a0098d619857263f455fa8cc7240652cd31c77c0a4dabb84da2684e66e5c722ea2d0b509b

                                  • memory/788-61-0x0000000002880000-0x00000000028C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/788-62-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/788-63-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/788-59-0x0000000002880000-0x00000000028C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/788-60-0x0000000002880000-0x00000000028C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/788-58-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/1144-141-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1144-137-0x0000000000400000-0x000000000045E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/1144-140-0x0000000000400000-0x000000000045E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/1144-139-0x0000000000400000-0x000000000045E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/1144-138-0x0000000000400000-0x000000000045E000-memory.dmp

                                    Filesize

                                    376KB

                                  • memory/1196-80-0x0000000000400000-0x0000000000432000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/1196-85-0x0000000010000000-0x00000000100E2000-memory.dmp

                                    Filesize

                                    904KB

                                  • memory/1196-88-0x0000000000400000-0x0000000000432000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/1456-119-0x0000000004C00000-0x0000000004C40000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1456-121-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/1456-117-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/1456-118-0x0000000001100000-0x00000000012B6000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/1456-123-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/1900-106-0x0000000002690000-0x00000000026D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1900-103-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/1900-107-0x0000000002690000-0x00000000026D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1900-105-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/1900-113-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/1900-100-0x0000000002690000-0x00000000026D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1900-99-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/1900-102-0x0000000002690000-0x00000000026D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/1900-101-0x0000000002690000-0x00000000026D0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2016-73-0x0000000002780000-0x00000000027C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2016-71-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2016-74-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2016-72-0x0000000002780000-0x00000000027C0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2016-70-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2156-120-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2156-122-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2156-111-0x00000000003F0000-0x00000000005A6000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/2156-112-0x0000000070770000-0x0000000070E5E000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2156-114-0x0000000000A70000-0x0000000000AB6000-memory.dmp

                                    Filesize

                                    280KB

                                  • memory/2272-143-0x00000000006B0000-0x00000000006F0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2272-136-0x00000000006B0000-0x00000000006F0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2272-135-0x00000000748C0000-0x0000000074FAE000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2272-134-0x00000000006A0000-0x00000000006A6000-memory.dmp

                                    Filesize

                                    24KB

                                  • memory/2272-133-0x0000000002260000-0x000000000227A000-memory.dmp

                                    Filesize

                                    104KB

                                  • memory/2272-132-0x0000000000170000-0x0000000000326000-memory.dmp

                                    Filesize

                                    1.7MB

                                  • memory/2272-131-0x00000000748C0000-0x0000000074FAE000-memory.dmp

                                    Filesize

                                    6.9MB

                                  • memory/2280-40-0x0000000002750000-0x0000000002790000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2280-42-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2280-37-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2280-41-0x00000000741B0000-0x000000007475B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2280-39-0x0000000002750000-0x0000000002790000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2280-38-0x0000000002750000-0x0000000002790000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2468-30-0x0000000002660000-0x00000000026A0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2468-28-0x0000000002660000-0x00000000026A0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2468-31-0x00000000741F0000-0x000000007479B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2468-27-0x00000000741F0000-0x000000007479B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2468-26-0x00000000741F0000-0x000000007479B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2468-29-0x0000000002660000-0x00000000026A0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2696-83-0x0000000000450000-0x0000000000482000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/2696-91-0x0000000000450000-0x0000000000482000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/2696-78-0x0000000000450000-0x0000000000482000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/2696-90-0x0000000000450000-0x0000000000482000-memory.dmp

                                    Filesize

                                    200KB

                                  • memory/2728-49-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2728-50-0x00000000026B0000-0x00000000026F0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2728-48-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB

                                  • memory/2728-51-0x00000000026B0000-0x00000000026F0000-memory.dmp

                                    Filesize

                                    256KB

                                  • memory/2728-52-0x00000000741C0000-0x000000007476B000-memory.dmp

                                    Filesize

                                    5.7MB