Overview
overview
10Static
static
101.exe
windows7-x64
1400.exe
windows7-x64
10Chase_Bank...or.exe
windows7-x64
10ChromeSoft.exe
windows7-x64
7Fake Windo...er.exe
windows7-x64
4Injector(v_5.24).exe
windows7-x64
8RCE.exe
windows7-x64
10TemD.exe
windows7-x64
10best.exe
windows7-x64
10btf.exe
windows7-x64
8build.exe
windows7-x64
6crypted.exe
windows7-x64
1download.exe
windows7-x64
7dp.exe
windows7-x64
7etbnoc.exe
windows7-x64
1fran.exe
windows7-x64
10fud.exe
windows7-x64
1gift_generator.exe
windows7-x64
7lol.exe
windows7-x64
10mt20200012.exe
windows7-x64
1nopax.exe
windows7-x64
10porn.jpg.exe
windows7-x64
1putty.exe
windows7-x64
10t.exe
windows7-x64
10vnc.exe
windows7-x64
7yk.exe
windows7-x64
10zztop.exe
windows7-x64
1General
-
Target
Uncategorized.rar
-
Size
10.1MB
-
Sample
231214-b7snkaagbl
-
MD5
f70a779b93fb98c2498e47ae9c412bfa
-
SHA1
3efba5fdaa770d91407b5acc0d07f2855fb9540d
-
SHA256
2f7c6195415c8d32bbf266557f2e31b945204713487644c46328160d1e730337
-
SHA512
48feadec999dcd8ed09ddfcf7f17e4f6c1331e479de65b126a0560e6bd7c3b71b63634241d2c9fb9e7ddbba8debfdeac574e6d60871fdd7c5bc03b2e484ad734
-
SSDEEP
196608:Z2vjGm/blzayw8+P0GiUHLU7wXFbsYbhNWSgDkJWAmDGYYfzuNpk9aJ0GeznL:6xzPwxFTHLTZrtNLgDT1YUsGezL
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
400.exe
Resource
win7-20231130-en
Behavioral task
behavioral3
Sample
Chase_Bank_Transaction_Authenticator.exe
Resource
win7-20231201-en
Behavioral task
behavioral4
Sample
ChromeSoft.exe
Resource
win7-20231130-en
Behavioral task
behavioral5
Sample
Fake Windows Live Messenger.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Injector(v_5.24).exe
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
RCE.exe
Resource
win7-20231020-en
Behavioral task
behavioral8
Sample
TemD.exe
Resource
win7-20231025-en
Behavioral task
behavioral9
Sample
best.exe
Resource
win7-20231020-en
Behavioral task
behavioral10
Sample
btf.exe
Resource
win7-20231130-en
Behavioral task
behavioral11
Sample
build.exe
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
crypted.exe
Resource
win7-20231201-en
Behavioral task
behavioral13
Sample
download.exe
Resource
win7-20231130-en
Behavioral task
behavioral14
Sample
dp.exe
Resource
win7-20231129-en
Behavioral task
behavioral15
Sample
etbnoc.exe
Resource
win7-20231023-en
Behavioral task
behavioral16
Sample
fran.exe
Resource
win7-20231130-en
Behavioral task
behavioral17
Sample
fud.exe
Resource
win7-20231023-en
Behavioral task
behavioral18
Sample
gift_generator.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
lol.exe
Resource
win7-20231130-en
Behavioral task
behavioral20
Sample
mt20200012.exe
Resource
win7-20231020-en
Behavioral task
behavioral21
Sample
nopax.exe
Resource
win7-20231025-en
Behavioral task
behavioral22
Sample
porn.jpg.exe
Resource
win7-20231020-en
Behavioral task
behavioral23
Sample
putty.exe
Resource
win7-20231201-en
Behavioral task
behavioral24
Sample
t.exe
Resource
win7-20231023-en
Behavioral task
behavioral25
Sample
vnc.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
yk.exe
Resource
win7-20231020-en
Behavioral task
behavioral27
Sample
zztop.exe
Resource
win7-20231023-en
Malware Config
Extracted
lokibot
http://vicesstudios.ru/frank/five/fre.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Extracted
xtremerat
securecenter.sytes.net
Extracted
http://pioter.xyz/min.php
Extracted
http://185.118.167.198:8485/task.ps1
Extracted
smokeloader
2018
http://segodnya.bit/
Extracted
F:\$RECYCLE.BIN\S-1-5-21-1514849007-2165033493-4114354048-1000\KRAB-DECRYPT.txt
http://gandcrabmfe6mnef.onion/5d5212de55099b66
Extracted
netwire
popupcalls.ddns.net:1177
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
false
-
use_mutex
false
Extracted
darkcomet
Scammer
leakedfilesvpn.ddns.net:1605
DC_MUTEX-C03PN9U
-
InstallPath
MSDCSC\msdcsc.exe
-
gencode
szVRti820J02
-
install
true
-
offline_keylogger
true
-
password
TheDivinity1989
-
persistence
false
-
reg_key
MicroUpdate
Extracted
darkcomet
hacker
snatchfou.zapto.org:1604
DC_MUTEX-EAGMYFG
-
gencode
QwbT0i9M7Prw
-
install
false
-
offline_keylogger
true
-
persistence
false
Extracted
remcos
2.0.4 Pro
RemoteHost
77.48.28.227:2442
-
audio_folder
audio
-
audio_path
%AppData%
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
5
-
copy_file
remcos.exe
-
copy_folder
remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
install_path
%AppData%
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
keylog_path
%AppData%
-
mouse_option
false
-
mutex
Remcos-TWB7DH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
startup_value
remcos
-
take_screenshot_option
false
-
take_screenshot_time
5
Targets
-
-
Target
1.exe
-
Size
34KB
-
MD5
c11be6a813f90bcd8c494893b91dc83a
-
SHA1
6e95d7d17a1f066e321101a077bed00f8202f19d
-
SHA256
03fe30fbe2e088a4a708b42d7f96de72738adb6f1c9f2a427d6826be4fc8104a
-
SHA512
909a4def92871df1c3cb836475f8bac9c44e4d13aa13b2f7c39f2f07f0d6634b7bb573c927843de137ff0401fc064bf6de41708ad9b37f2b2e6e53d5408e8e35
-
SSDEEP
768:JmHqsQmJex3elE9aHRAvSghgujT4wgutm/eMRw/DghUdgUkc:0HqsQmWZ9QGFguQ/er4qD
Score1/10 -
-
-
Target
400.exe
-
Size
147KB
-
MD5
7ca230d03a194762401f67ce9e72fcd1
-
SHA1
21e03b6f2b687a9b95d2779ed846db19126d6e07
-
SHA256
3d7bcee5647287b9e2c3ceb552e8c71379eb1c4946d74881edc730dd5501a78f
-
SHA512
1ba90b5017b859a915abc772a78d0da3060f01115ae6d25115d2d916d56bf4f1e2e78628b07284a2de18b75ebbffbb381d281673b7f82c3cfc2f5e7cb7f1cd35
-
SSDEEP
3072:5oFRQGCIIm1xT5GWp1icKAArDZz4N9GhbkrNEk13gL:YQGCIImhp0yN90QEN
Score10/10-
Blocklisted process makes network request
-
Adds Run key to start application
-
-
-
Target
Chase_Bank_Transaction_Authenticator.exe
-
Size
579KB
-
MD5
5192bbb0ed2aafeb162ceedeff0f945c
-
SHA1
81a0ee9d8292cb6afdf7a64058037fb59ece0d3b
-
SHA256
7a70ea2507a42c784dee6b15aad72cc1d02c054fceec43c41537cbd5f7413b8d
-
SHA512
0514aa556d8e5ca553d44170ff57bfc5c51b68d7f997828b2804dc13cd41a131049ccbd92ff2c26be9b698e50c18d7165b3629f9af8e2ad92c2910828059f8c8
-
SSDEEP
12288:6urRW9O5h9vWpoTlznthtzOyRV2eEv5+V0+3K7OIVoBG:6kU9ofKMhlOyV2eTV004NoBG
-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
ChromeSoft.exe
-
Size
991KB
-
MD5
35a9b0b465f5518c5ede57b5a61e96bd
-
SHA1
99870ddf8052eebf53925238510bda22a0666a19
-
SHA256
44f0c8410f5308e7b9e23f056611997c4e3152d3a4f029bce26f6dae1fbc067f
-
SHA512
49bb9ac046c4f6d597c2cb3446defc179eab25f594cd30d6ed81429fef95998838c3a321ff34410a3bd10a73b3c39428deff03617cf2865cae9322ee0c1df50a
-
SSDEEP
24576:TUlZA/teq/PTCzG5hPSw24aSeNc5xnPB9Mb7u2mQHpep:TYZKtemTCC5h6J4QNcfPBub7Lmb
Score7/10 -
-
-
Target
Fake Windows Live Messenger.exe
-
Size
1.4MB
-
MD5
a7a75a56b4b960c8532c37d3c705f88f
-
SHA1
e69d26db431e383131826fab5db213559ee68814
-
SHA256
6b34cf6100ac5bf4479250048d61cc4d873dd84af74e5b2771b3205e2dbf0d22
-
SHA512
8ae713ee44d87bfc91aeb34fe26ffc2ce20c6080037478bb5abf406abe09f86217ab4a8915fc3833a81fe3c629186217c17c9568adcb64d7399f9f5f3d0f2a48
-
SSDEEP
12288:ebcuIcRD7ZPotep+8dG0Kxi+M9IrQscUjMRWENBui09YAaAWapJOhzqzW1:eYdsZPNJ5QEN4eABpJOg
Score4/10 -
-
-
Target
Injector(v_5.24).exe
-
Size
1.4MB
-
MD5
e90b6e88aff0deb37ba50c0204086321
-
SHA1
755874282e3fc6eb633a230c2f6c7b9612e8078f
-
SHA256
42e978f65d8e988cbfc34055418421f6b7988defba5b3503b5ce4f3a8974908a
-
SHA512
3d9bf6249969574e9b27528765f30b810986ceab18af4a8025c42e694d2c3aea7bfdce7ee9da41de3b056bb2acb9ffd2418bdbb0efbc4d5f88e3d4d0ae7cca8b
-
SSDEEP
24576:eq7CqHPYkqjQcrhgWd3IJjqWMKWh0X+7q/zdTAxSZuHlWG26+USxle/b2mhfx:e+Zc1gWd3IeBMzdTA8ilW96+deVhfx
Score8/10-
Creates new service(s)
-
Stops running service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
RCE.exe
-
Size
586KB
-
MD5
bc2c57458db20a2a2d4ea99b3f5b8d37
-
SHA1
25e08e1ee03372c5ce2f14fde486eee8bf6d6669
-
SHA256
af6ea3e8d3f391d34464e30e2622162b417050345b429fb7553ff57d2c168be1
-
SHA512
62ba9a5a19ff048eeebf3b611d83cdc3ac78805adc03751c30d5c530f4542f94fb0216d52c4ba94dbe3dc81604f6074c45c22ddc306891a994fabe6fdc923132
-
SSDEEP
12288:uh1Lk70TnvjcQ+QSUofDRJsaVZ/OP4400KBIqLdMQT:ik70TrcQWHsgdZBISrT
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
TemD.exe
-
Size
648KB
-
MD5
e7d36392836c350b47e1e485465f2446
-
SHA1
b4cfaca779557d14cbccf09accefaf4ec8cec30e
-
SHA256
e037f166b8e3066f5b8fc2f4dea6cf0d052dde5234b46c81e3d5ecf73dc713c2
-
SHA512
c6f530cbfcf8d145e06c7850b1c51f2dc9efbd893229d12a2fe035be89d3c32979c803f4122f77278aa7d3595f70b99cd3fb867adeaea51fbafbaae7d265a3a1
-
SSDEEP
6144:DHtgbfyyNili9mp2kS4/JfrtkXl5w5R0koDQY1/rIPpGV8eY2M:TtcK+iEJ6RraXfwBoUY1/r8KB
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
best.exe
-
Size
626KB
-
MD5
d7078f34bfa30ec5781ffb8f4508365e
-
SHA1
d586787f851c548d151c17326e866ce025485cd9
-
SHA256
0cfe9c1725dfc5f73bb36ae2b168958f8ee8cf008f1240cf2808a91a513e22d4
-
SHA512
9b20e3e8a40dcee460d0296b5d70dc1e29eb2c1f00feba7e83e60cd829bfeef1cb5e13970e6ed8f904e65f07a7817eea46e3f6c0b500dd7a6f91f8dbf1f59172
-
SSDEEP
6144:8xkJDc+HCvgLqdLaUI4AMg9NnFkAD+X6I+RyK:8+DcOq5aUI4AMuFkAKZ
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
btf.exe
-
Size
227KB
-
MD5
46d7fd84e5b0f5e1fcdef83849adc51f
-
SHA1
c81eca8a560b3c8125d98a13cca3df6bc0c05902
-
SHA256
87b87c2135fcff2177dfb95507421a129516cda41d8fd53afd4e9abeff2b8128
-
SHA512
e9e58cf166a9625b7e5a4481d68970fef204e055f9f26a3c1d6c09ba8708f2fc493c36e8e79e65dedf33dde6e80706d7c5b2b92f9e7c94d1b6875029f4f3c427
-
SSDEEP
3072:JsILl8Skwzl58qNtX7BVpHCsJlbApo309BDrZdOrALcfEjrtH3:aILnzlNr7JHVZNE9JHGxf
Score8/10-
Stops running service(s)
-
Deletes itself
-
-
-
Target
build.exe
-
Size
575KB
-
MD5
4914bee9bf904b881fcb0f7fee9d0d76
-
SHA1
b31d933efd9aef7c571cd0fcd0e46ae4b8f8e0df
-
SHA256
797d8df51b4efddd420d5629bf7151fe233503b9056384a498c9112355bb5aa8
-
SHA512
b32388e46ee90bb5aa7bebb1e74d7d35c3b951bb51730aa50afab8f68353e89a0a90d5076c29f61162bd7002af0ff8e5cd9502dfe3a6f1f70d7390079e6563a0
-
SSDEEP
12288:yJWIL1y06PRyOqTusJiTJZJplL16sGYS67K:yYIw06ZyOqTuTNHL1PHS6m
Score6/10-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
-
-
Target
crypted.exe
-
Size
1.5MB
-
MD5
f073e14adb7e3f4e14f77cc1f8926e3f
-
SHA1
674a65bcea3c2a46e25cab15c4b96c62dc05f6cb
-
SHA256
bcd39cc58fbe682eb0a3126c9e19a04fcfaf38e520e2a4d0fe75f5175c9d0bad
-
SHA512
7657d7e58b9dc975f710e8eb84532f483d9c1279ba26e2e0b87e8cd0b02dfe91ee2e12f87cdb37d8f5bfeb900b3a6af1b9fbbf9bdcef13b8d405db2d2874dd2e
-
SSDEEP
24576:vD/wom6ZtxQE6EjYsZB4regvCaXUOHWdEzDoJusUAk/XdSL9/E7fIMsDbm4GjqZ:rdjy80s4reQC2U8rucXQJE7fIMsDitG
Score1/10 -
-
-
Target
download.exe
-
Size
314KB
-
MD5
3977010fbf956cf80875f7fb23e67585
-
SHA1
45c4128c77ebe801e26d370eb5f9ce01de50548e
-
SHA256
ef4a6b750e05c1bd61e3e096ed036e7715cd5abac5e29219a3565587508bec4c
-
SHA512
bf22d5a46d81fc8016fc332abf0df1b8eeee4d244434e785792cb316f9f1ee0089d01981810c880bed0cf69d9975fea06df9c4b5029ae888113543f36b54fe5d
-
SSDEEP
6144:x0QYb7lWphzxoL0uEYeRYByIYVCw9EJvYXW+6j5HXHngZBUIGmM:GQ2WiL0ul8Io/9T9m53AZBBt
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Creates a Windows Service
-
Drops file in System32 directory
-
-
-
Target
dp.exe
-
Size
626KB
-
MD5
e8d034a10d9f1328d70e0e6ff86af115
-
SHA1
86773bf3028d4ce4c453810b7a8db87cac27cfc1
-
SHA256
f88ff0acb3e08e51fa051bff9a176ddb952a99bf2989032e6000b7d7c0836c07
-
SHA512
d267737a4eb59200bb6a7bea7fffb45be3ef564f38a2d65f27cd22b7e09abbd52463806b144f0b6fa49887821f1a1d27dd555776a910291b213d5f9c85be1f6c
-
SSDEEP
6144:MjNiSxkJDc+HCvgLqdLZhUIb7ImU46zNsOJt3:56+DcOq5Zd3IN44b
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
etbnoc.exe
-
Size
756KB
-
MD5
6ae3ffdc97e5f6f61cbb343fc2ccdb3b
-
SHA1
b0db875f64203532338e60ed41e3f91dab680075
-
SHA256
8a6fe641d7bd4ea61247380051f466d3e985d7cad1988f929020c36554adaf98
-
SHA512
384acad7dc62dd8014fc7a388482d9c88da311adbe4033f64c9d4f7b67f5fd327acff70f2ba5723d70493934252fc38ed78d00312a927778c1cd3c558a4236b3
-
SSDEEP
12288:WI/9ztf3KmGnin2lcRk8HTtaSbHUtuF768idW:fZ1KXnigca8zBUtul68iE
Score1/10 -
-
-
Target
fran.exe
-
Size
408KB
-
MD5
d7c579d650a333141109e3d68a5b340d
-
SHA1
707585b88365f8ab7979189039de1d4d895305f5
-
SHA256
fdf39072431895a952df728972e57657f2a3774c5db7ac41235a32b98847eced
-
SHA512
afe932d128e6567904d3dde9485cf8da109e02b8fad6241358f90fd9c5081da29a71495d17c3c31f12357a53a730adae90f804b2670a8b1870f9a1236229ab10
-
SSDEEP
6144:iqblMNjjal406GLWT944U3Em3ffFPoeZV3JjCvm:iQ+Fjg76GLM490Wff9
Score10/10-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-
-
-
Target
fud.exe
-
Size
32KB
-
MD5
f8151c088ddc990b4d605558214c520d
-
SHA1
7cd5e1801ee0a29b9bbdb4a71dc8d99c38729dbf
-
SHA256
bcf048728f08339a629aa195da8a04f716902c20131cc0a82dad1d74d8cb1f9f
-
SHA512
ed0cc44a6332e77b2fcf7d21702f6b8b9415a7c511923593c9d729155bcdff6cd65f80e86ae9f602c561cb03bdc64c758b36ad4f3b2aabe6920990109767394c
-
SSDEEP
384:/Ttqrt7S6TC1kclC+SbvYr9OMZj2nqPtGUV:/BqZRTC12Mr9P/PtGU
Score1/10 -
-
-
Target
gift_generator.exe
-
Size
558KB
-
MD5
b82df74ac1d74deb7fe4be8743cd7dfd
-
SHA1
00a41f31b66f1484607d60c61f0d57766c6d2ca7
-
SHA256
24c98fa7f3aa92fbb15b97556f870ffa0687d7aa29b8fbfd44cb520cc97130ca
-
SHA512
286c65029029d41558e25d9269b0dd00d88c2627c0dd45ab52a22a25869f8f6604ea4efe010f9a4f763380935e89faa7dea83a34d0e19f050b7f52fa67484235
-
SSDEEP
12288:vOuFiuVKNCjMlt3zaQujADveg/QChuZ2OdSkDOfFN/9vXLrE8nlZcxVJx:vgu4N3lhPujEveg/Nho2OdSkSfFN/tXc
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
-
-
Target
lol.exe
-
Size
347KB
-
MD5
bddda55fb978f891603a996d531f91ae
-
SHA1
926d297215144f42cf6d71b04f01f1682b2571f5
-
SHA256
4f382b6cb87c5413002055e474ea300d53c67bffdf63cb322fc1a55cfcf2e0ce
-
SHA512
5a40b1f769778bd7ac64e38f285770f0e7257b15e2fefe52baa4af5164bd2b325407aece01c47ed7435136b464b6a486399f9f66f4e7bc81e0be360614bdfa38
-
SSDEEP
6144:Xjbei105yc4ZU8a8vM+9HMg8kTs4GjJVV2RrqUuqrZ9FQ0CI:XuwFqhSMYHTVYjjJVgRrqUj7QLI
Score10/10-
Detect XtremeRAT payload
-
Modifies WinLogon for persistence
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application
-
Modifies Installed Components in the registry
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
mt20200012.exe
-
Size
360KB
-
MD5
096968ff322e774212e2ccf8a131c5c0
-
SHA1
603ca5b5db5591012442c0b27939039bffc1d089
-
SHA256
161de1e2e619fb08f3d9702ba9ec4db9fbea6e85a29eea568c5a53b0c903e4bb
-
SHA512
d33566e014aae6dafe0baaa1ca3d1fd15dabb17b16bbc0d5c913479b1cfa990a679b4a2fa1cd206067b8e664bd9e5fc7161277ae2b9f90842ab2ba8dc5f9ed2b
-
SSDEEP
6144:vxtYY+vbWjoIcbV6Tp3z/Z9VQruMMyvwFtDkbtUYVSjGagloK7GO:vxT+vCjPd3z/bar5MU+gloeG
Score1/10 -
-
-
Target
nopax.exe
-
Size
200KB
-
MD5
882d3606ae24316cc0a0b1c879999437
-
SHA1
7e4e484883474132e56c69cd87dc1ed390eb89ae
-
SHA256
ed2620f248d304129d3772dcf6ff2e42850fd4daf79895c90a1a71a8ff2a260c
-
SHA512
9bd9e551cddbbc5e1029aa2c423f6147d4a0128efdd8a161a6fb6d266b2b44c46402e754d8d8a3946b2ae05ca14f202d93e01e5f6e5b21db83581d25467bbf91
-
SSDEEP
6144:rLgA/4OWNIaSKGL3icZcDrwOK43CMniZw:rMAAjgHZcDPKvcc
Score10/10-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
-
-
Target
porn.jpg.exe
-
Size
211KB
-
MD5
2ca1f87a624245db0a57bf439b71d460
-
SHA1
2f6de1b66d8021b74ebcee0040b9a7c00b61d231
-
SHA256
06af68780ff670177daf0d6e34918976a46f9e69787a284b8757470fb02903b3
-
SHA512
7bc842d94abce1de0844c3d9c3f0c055e8bfd9465b63cb86ddb3dbb731ecf802b67694c0e258d78ad3eaadbe5476da1286e681af48368f896fffc6acbfb17347
-
SSDEEP
6144:Agn5+W7mFJ+7kTJEBv4aR47s4nYiayol:n5+ZFY7kVQBR47s
Score1/10 -
-
-
Target
putty.exe
-
Size
218KB
-
MD5
b29bfe0978cdeab5a09b8ab31eadbaf1
-
SHA1
9c930ee306446556d22b5469a8c5943a56e7197f
-
SHA256
2f022dacd013c10da72759a20cf7392637460f983d59631ebf636328d0f977ee
-
SHA512
7f721aa07a073117575e7fe4cd10228f2da1c31ef6df32fbf0722577616998d476aef415f7b29be7ddd0384270f4c66f8021ac06da469799ebe739e6f667d71b
-
SSDEEP
3072:/SAzTSCFUvN/0Lz/2rir+HrBNBB50FO+7Vcx8BBjlIGOPA2EeHOz3ctJ:6MFUaP/2ZVzJ+Jcx8xN2EEOzct
Score10/10-
Renames multiple (290) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
t.exe
-
Size
1.5MB
-
MD5
78b78c70ad66d95e136a4cb10395f403
-
SHA1
ece7e87cc76f8862218213c6775613604ad97d4a
-
SHA256
389851b1a38b0079d88402edf0ebd0d5ba492dfd759a80c27b0b18a248feb2b8
-
SHA512
cc6f701115c9bb27de712cede13fa693c3ae78f20ea524003627cb75cabae4eb84d86d03b9e963ff9ccb49fa404b142cf1b73b2c9e43cdf01fddad4d70513466
-
SSDEEP
24576:59cs4/QiYjQSjCB65cTg56axZ5DwOGA5s0:0sgUjQFB60alkOp5
-
NetWire RAT payload
-
-
-
Target
vnc.exe
-
Size
385KB
-
MD5
913120c0c8602bcb2abe0e1741d45566
-
SHA1
7b569e8479ffbc85f6c70ddf8a7fea62b6c8ad32
-
SHA256
70de0596db51d6b09be92271e7140dc949074224d29352b4e64889df152278b2
-
SHA512
963b162a17e5c4a928df0e96c29b446d30dfc130e887fe74360fef79e974c3ba5175b914432a1879c9c16cfdb965acd414fdbc2e83ac74406dd02f660bd62abd
-
SSDEEP
6144:39XdnJkIv5nQb9QVj99dMJmCxuOGGO4+Vmia5Re4wEWMuej7ul7tLM:/nOIvRQmpjKJxu3J8R/WMuW7I7JM
Score7/10-
Suspicious use of SetThreadContext
-
-
-
Target
yk.exe
-
Size
1.1MB
-
MD5
bb73060a44e8fb34f92dd1815c6a300f
-
SHA1
ab65f6880b9dddda7af5d2289f4858f48b8162d4
-
SHA256
c1f0d4cc18f34c9f111d74da644c3e21827a01f5e862deb667e9e18ee8e7258d
-
SHA512
91be2ab84f17cc907c057c75c8dd9ccc0914aecadd19c390a7edce9efa21936fbc450d6267eb17af8213afd15daa4d12f0b10658d55a6a38232c9cc327409146
-
SSDEEP
24576:+31SZSaMidm23AzTOAV4xhFIaSV5VZZGSDNVwftoJNDBki+4K4zI4VX9ImOfj:+wZSTidmvuAGhFA54qVwfoNDBkirJzIP
-
XMRig Miner payload
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
zztop.exe
-
Size
642KB
-
MD5
72049be7bd30ea61297ea624ae198067
-
SHA1
b7b74712a1d44aa3646eca78285e1e70c7c73083
-
SHA256
a21a16b0d9bfad52eced7a74d50c2acdfa42654d0fea2049312adf92542c4cad
-
SHA512
eb8f78b8e49c6df03409090b6c8bffe1a8a581baefad2b91855906bed284c52dfd74ae2fabde6eca52de8d89437c9ffdddeaf1a8cb000f5ea0ee699e9f14920a
-
SSDEEP
6144:qJXmzzSHV/y1FNI8taGqHTU/Kt6flq66O8PtYivxLGD4qI1Yhjb2OZEX93/opbos:0mzrZIiagKUtq6vQlX8
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
4Registry Run Keys / Startup Folder
3Winlogon Helper DLL
1Create or Modify System Process
4Windows Service
4Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify Tools
2Indicator Removal
1File Deletion
1Modify Registry
10Subvert Trust Controls
1Install Root Certificate
1