Overview
overview
7Static
static
7MspFet.exe
windows7-x64
7MspFet.exe
windows10-2004-x64
7MspFetCon.exe
windows7-x64
7MspFetCon.exe
windows10-2004-x64
7WinIo.sys
windows7-x64
1WinIo.sys
windows10-2004-x64
1EXE/BSLDEMO.exe
windows7-x64
1EXE/BSLDEMO.exe
windows10-2004-x64
1slaa096d/E...O2.exe
windows7-x64
1slaa096d/E...O2.exe
windows10-2004-x64
1slaa096d/EXE/demo.bat
windows7-x64
1slaa096d/EXE/demo.bat
windows10-2004-x64
1Behavioral task
behavioral1
Sample
MspFet.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
MspFet.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral3
Sample
MspFetCon.exe
Resource
win7-20231023-en
Behavioral task
behavioral4
Sample
MspFetCon.exe
Resource
win10v2004-20231023-en
Behavioral task
behavioral5
Sample
WinIo.sys
Resource
win7-20231020-en
Behavioral task
behavioral6
Sample
WinIo.sys
Resource
win10v2004-20231023-en
Behavioral task
behavioral7
Sample
EXE/BSLDEMO.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
EXE/BSLDEMO.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral9
Sample
slaa096d/EXE/BSLDEMO2.exe
Resource
win7-20231025-en
Behavioral task
behavioral10
Sample
slaa096d/EXE/BSLDEMO2.exe
Resource
win10v2004-20231025-en
Behavioral task
behavioral11
Sample
slaa096d/EXE/demo.bat
Resource
win7-20231023-en
Behavioral task
behavioral12
Sample
slaa096d/EXE/demo.bat
Resource
win10v2004-20231023-en
General
-
Target
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip
-
Size
295KB
-
MD5
8e3b695ff32596433ca6f50f8eeda13f
-
SHA1
6cd7822a259435782e0611004bf38c582a806556
-
SHA256
c9bcfe23fc853ba27ea8fd3e3de6ef625eb1c552a2b225cb3dd070f746333c1e
-
SHA512
9d037c64a9bb965ec05e155ed9bec151ef2ec5781cf04a05797e8efe0e2cf77b8f3263ede565344cccaf28f40b1a84d7a73e1f41c85008631c47a600eeb0f576
-
SSDEEP
6144:wC52omm+TR83U3OPP+DgyN2l8f6xJMFZ5s0ID2ip3rpbcU/+KULJu3xnxK:wq2oFV+E3ZJMFZ5s0Iyy5P+KUtu3HK
Malware Config
Signatures
-
resource yara_rule static1/unpack003/MspFet.exe upx static1/unpack003/MspFetCon.exe upx -
Unsigned PE 7 IoCs
Checks for missing Authenticode signature.
resource unpack003/MspFet.exe unpack004/out.upx unpack003/MspFetCon.exe unpack005/out.upx unpack003/WinIo.sys unpack006/EXE/BSLDEMO.EXE unpack007/slaa096d/EXE/BSLDEMO2.exe
Files
-
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip.zip
Password: infected
-
dd35ff43c3c211d850d06073550ad2cf62d75af18e34397c5c0471e97cd5e96b.zip.zip
-
mspfet_161014.zip.zip
-
MspFet.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
MspFetCon.exe.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
WINIO.VXD
-
WinIo.sys.sys windows:4 windows x86
172b54da983eaa27abf08d8ed525b840
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntoskrnl.exe
RtlInitUnicodeString
IoCreateDevice
MmAllocateNonCachedMemory
MmFreeNonCachedMemory
Ke386SetIoAccessMap
IoCreateSymbolicLink
IofCompleteRequest
Ke386IoSetAccessProcess
IoDeleteSymbolicLink
ZwClose
ZwMapViewOfSection
ObReferenceObjectByHandle
ZwOpenSection
ZwUnmapViewOfSection
IoDeleteDevice
IoGetCurrentProcess
hal
HalTranslateBusAddress
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 32B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
INIT Size: 544B - Virtual size: 536B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 128B - Virtual size: 108B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
changelog.txt
-
readme.txt
-
slaa096b.zip.zip
-
EXE/BL_130V.TXT
-
EXE/BSLDEMO.EXE.exe windows:4 windows x86
cb5eff3fee8fa73a73a7c4e8a100a774
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcess
PurgeComm
WriteFile
ReadFile
GetTickCount
Sleep
ClearCommError
CloseHandle
GetCommState
SetCommMask
SetCommTimeouts
GetCommTimeouts
SetupComm
CreateFileA
GetCommandLineA
GetVersion
ExitProcess
HeapFree
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapAlloc
TerminateProcess
SetCommState
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
SetStdHandle
FlushFileBuffers
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetProcAddress
LoadLibraryA
SetEndOfFile
Sections
.text Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
EXE/PATCH.TXT
-
EXE/int_vect.txt
-
EXE/test.txt
-
SOURCE/BSLDEMO.DSP
-
SOURCE/BSLDEMO.DSW
-
SOURCE/bslcomm.c
-
SOURCE/bslcomm.h
-
SOURCE/bsldemo.c
-
SOURCE/ssp.c
-
SOURCE/ssp.h
-
readme.txt
-
slaa096d.zip.zip
-
slaa096d/EXE/BL_130V.TXT
-
slaa096d/EXE/BL_150S_14x.txt
-
slaa096d/EXE/BSLDEMO2.exe.exe windows:4 windows x86
a02b228d40f46dc97718e949a5585ee2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetCommState
PurgeComm
WriteFile
ReadFile
GetTickCount
Sleep
ClearCommError
CloseHandle
GetCommState
SetCommMask
SetCommTimeouts
GetCommTimeouts
SetupComm
CreateFileA
HeapFree
HeapAlloc
GetCommandLineA
GetVersion
ExitProcess
GetLastError
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
GetCPInfo
GetACP
GetOEMCP
LoadLibraryA
SetFilePointer
GetStringTypeA
GetStringTypeW
SetEndOfFile
LCMapStringA
LCMapStringW
ReadConsoleInputA
SetConsoleMode
GetConsoleMode
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
slaa096d/EXE/PATCH.TXT
-
slaa096d/EXE/demo.bat.bat .vbs
-
slaa096d/EXE/int_vect.txt
-
slaa096d/EXE/test.txt
-
slaa096d/SOURCE/BSLDEMO.C
-
slaa096d/SOURCE/BSLDEMO.DSP
-
slaa096d/SOURCE/BSLDEMO.dsw
-
slaa096d/SOURCE/BSLDEMO.ncb
-
slaa096d/SOURCE/BSLDEMO.opt
-
slaa096d/SOURCE/File_Func.h
-
slaa096d/SOURCE/MSP430.h
-
slaa096d/SOURCE/TI_TXT_Files.c
-
slaa096d/SOURCE/TI_TXT_Files.h
-
slaa096d/SOURCE/bslcomm.c
-
slaa096d/SOURCE/bslcomm.h
-
slaa096d/SOURCE/ssp.c
-
slaa096d/SOURCE/ssp.h
-
slaa096d/legal.txt
-
slaa096d/readme.txt