General
-
Target
mtk.exe
-
Size
3.8MB
-
Sample
231025-fah53sea99
-
MD5
0f9599d3ddf1e0c8f818d384ee8d0d19
-
SHA1
2ca17aef38df0c00efa49b4b448c5f8343725c2f
-
SHA256
a98aec4a39f5f5ee41280cb17d9b4b5e9bc1eea2fb2ff0d7a962e2b74464d67c
-
SHA512
7c41c8bf3cadf94f14c25b1e85f3d56a4d39918b1b3718d3f8a284164dc02eb2643ebc28069c1bb7e84adaac41211c52f5e47fa10b86e797c64a6d4cfa0efbf7
-
SSDEEP
49152:F0BKpXaVwQ5isgxUX+E5ZQcK2mqyxlb+oYLTL2QZnDNR0t62zm33Nar:Z7UwuyJYXL2QZDCzK3Nar
Static task
static1
Behavioral task
behavioral1
Sample
mtk.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
mtk.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
amadey
2.03
-
install_dir
3101f8f780
-
install_file
gbudn.exe
-
strings_key
98efc0765f4c223e79368db4c8650353
Targets
-
-
Target
mtk.exe
-
Size
3.8MB
-
MD5
0f9599d3ddf1e0c8f818d384ee8d0d19
-
SHA1
2ca17aef38df0c00efa49b4b448c5f8343725c2f
-
SHA256
a98aec4a39f5f5ee41280cb17d9b4b5e9bc1eea2fb2ff0d7a962e2b74464d67c
-
SHA512
7c41c8bf3cadf94f14c25b1e85f3d56a4d39918b1b3718d3f8a284164dc02eb2643ebc28069c1bb7e84adaac41211c52f5e47fa10b86e797c64a6d4cfa0efbf7
-
SSDEEP
49152:F0BKpXaVwQ5isgxUX+E5ZQcK2mqyxlb+oYLTL2QZnDNR0t62zm33Nar:Z7UwuyJYXL2QZDCzK3Nar
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
StrongPity
StrongPity is a spyware developed by PROMETHIUM APT group mainly used in government sponsored attacks.
-
StrongPity Spyware
-
Thanos executable
-
Modifies boot configuration data using bcdedit
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Winexe tool used by Sofacy APT in several incidents
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-