General

  • Target

    fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841

  • Size

    2.7MB

  • Sample

    231012-mrcsysdf9v

  • MD5

    fc54078c5ae26d856109d306c37909ae

  • SHA1

    8beab9e454b5283e892aeca6bca9afb608fa8718

  • SHA256

    fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841

  • SHA512

    2b3b3bff34a833c1cbeee7b280dcf70364bf9d3bcaa6c9c13a192257e979c1457abf113f1c75a02639a8f8fb302f453efcde9a1103fee87dfeea188fff28acdd

  • SSDEEP

    49152:1+GXVzVoug3HVnBkzUpz1p59ze+WuGnnlUxA2Uf+Vv9exf7N74bLWSSHV5jgdXOC:TXnoug3ZBt3/3W9nIUfc0fh4/wzeth

Malware Config

Extracted

Family

caprarat

Version

MSK-2023

C2

ptzbubble.shop:14862

Targets

    • Target

      fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841

    • Size

      2.7MB

    • MD5

      fc54078c5ae26d856109d306c37909ae

    • SHA1

      8beab9e454b5283e892aeca6bca9afb608fa8718

    • SHA256

      fbde6f65c960c2469d957f1fdb6d7240bd6eec5e4f34b68e01dda85cb9bf6841

    • SHA512

      2b3b3bff34a833c1cbeee7b280dcf70364bf9d3bcaa6c9c13a192257e979c1457abf113f1c75a02639a8f8fb302f453efcde9a1103fee87dfeea188fff28acdd

    • SSDEEP

      49152:1+GXVzVoug3HVnBkzUpz1p59ze+WuGnnlUxA2Uf+Vv9exf7N74bLWSSHV5jgdXOC:TXnoug3ZBt3/3W9nIUfc0fh4/wzeth

    Score
    6/10
    • Reads information about phone network operator.

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks