General

  • Target

    Random file mystery pot Suprise.zip

  • Size

    7.8MB

  • MD5

    4304c66e786cd42c4bb09c6f6766fe49

  • SHA1

    e48d47e5e689ef4dcb73e278b9b6be0407cf2147

  • SHA256

    052e54df0b86483f84bbff6504e202c36e7bc25885e369e830dd7086fb7c7562

  • SHA512

    711b5e410f283a64887e6e2857967a905a9ddc9762bf974b228c3ef951fa475bed3c0ea23fd4cdadfcac6e54e59cba9b5a87ab0d32401242d90024a174bf3812

  • SSDEEP

    196608:NhViVR5xBwoRAmd60/n1pn5OOiS+WV7ytaNVW/0WDqC:N7idwO80fvLW0Wj

Malware Config

Extracted

Family

redline

Botnet

@esaymane

C2

91.142.79.218:26878

Attributes
  • auth_value

    78723e767811c55bea193f76621d6be1

Signatures

  • Detect ZGRat V1 1 IoCs
  • Kutaki Executable 1 IoCs
  • Kutaki family
  • Panda Stealer payload 1 IoCs
  • Pandastealer family
  • RedLine payload 2 IoCs
  • Redline family
  • SectopRAT payload 1 IoCs
  • Sectoprat family
  • Zgrat family
  • CoreCCC Packer 1 IoCs

    Detects CoreCCC packer used to load .NET malware.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unsigned PE 12 IoCs

    Checks for missing Authenticode signature.

  • NSIS installer 2 IoCs

Files

  • Random file mystery pot Suprise.zip
    .zip
  • 076be2c09b944ec56381f42405728f7f657d2597b6e27191354568fb70170b29.exe
    .exe windows:4 windows x64 arch:x64

    9bfd2dac39af50555ae9789117b36b66


    Headers

    Imports

    Sections

  • 0fd2b5dba8eb6762b397cf61bd9c2ff9de3eefc8eb8c4cbb1002d1b9c96fe5d1.exe
    .exe windows:4 windows x86 arch:x86


    Headers

    Sections

  • 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
    .exe windows:5 windows x86 arch:x86

    0dd592f35b48076810a8314d458b6b4b


    Headers

    Imports

    Exports

    Sections

  • 1c133b9bb476879df8145370ce1069ec92f28cade85a839e0159158a3e1b1afd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 30af8d3ec685a4a5669f1377bb74589772a0428d9daa214c179a795dcf4b9030.exe
    .exe windows:6 windows x86 arch:x86

    d36bced6e7dcd17a451d812dbc954837


    Headers

    Imports

    Sections

  • 41c9d28653704e628d8dd20e5f65a298242072156a31bc5fe0e24a1f4c640af5.exe
    .exe windows:4 windows x86 arch:x86

    e449639e3d5aef200df08087c6240e5e


    Headers

    Imports

    Sections

  • 5a0daa24b5748d81ba0bb78d7f2b50eb4c387ffe679c92c1462f7dec586adb1f.exe
  • 630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 651bc82076659431e06327aeb3aacef2c30bf3cfd43ae4f9bc6b4222f15bb673.exe
    .macho macos arch:x64
  • 677bea9e71aa3a56fe62a20580eb0786431a4789cb340a7294eb243054191c58.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Code Sign

    Headers

    Imports

    Sections

  • 7afefba65e72f42925ba76fae9ea98286eff7d0d01dcccd07c6117384858b6bb.exe
    .exe windows:5 windows x86 arch:x86

    8199980e4fa11bb2eef21fa8f6072def


    Headers

    Imports

    Sections

  • 817c226e42f5c503325288fd8273bc03b326590f457e7a589eb34c2792d0a5db.exe
    .dll windows:5 windows x86 arch:x86

    936c4bd8d850f5712905e253addfc71b


    Headers

    Imports

    Exports

    Sections

  • a925fc1289573f01bb86482e38340f0fe431269aa7500d776713c71091c49142.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • b1c5fd5c0f6a2760eb638414d9bf9b7536b81f45edbd9d509dd085346c67a6ae.exe
    .exe windows:4 windows x86 arch:x86

    ced282d9b261d1462772017fe2f6972b


    Headers

    Imports

    Sections

  • f2923f695dc02132cea5c0241060dba9a35d317342675118f7b22288e78cee7d.exe
    .msi
  • f58d2071a2fdaea27d814e788e002fe5da63843546f22c255eceade162323ce1.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections