General
-
Target
f7b002fe39ed2144ff1ba674909ec7e0
-
Size
1.3MB
-
Sample
231228-zrv1raebak
-
MD5
f7b002fe39ed2144ff1ba674909ec7e0
-
SHA1
80d7c2eb68db5c552865783946e236a0d14860b7
-
SHA256
e2fae47a626faef8538b9ef12935a02cfd26193bc283d0306e310a1403710223
-
SHA512
3aff459428202997d991600b1e6adb2643b9c901002280ea90f0aaeecbcdc4ecee8bf9475b578164acb464dfebfdd32c14bb452264248d31c89524c51475a7c5
-
SSDEEP
24576:+cOuWFLnabRCFJUDYzg/+5tLyfgy7g6fE8L4JJBqPnO6taLYjiYZ3/dFTP:lOPTabuQ0D5tufLPcBsO6YKf
Static task
static1
Behavioral task
behavioral1
Sample
DLLLoad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
DLLLoad.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
Hamachi France.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Hamachi France.url
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
TeknoGods.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
TeknoGods.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
teknohelper.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
teknohelper.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
DLLLoad.exe
-
Size
239KB
-
MD5
4e9a4c28fdd0e60042779117a955a074
-
SHA1
ec487996c03cd1c3bf3dc56b07bf31196e0cb6ed
-
SHA256
12f991863c77a5ef017a0b3be8146de65952b736dd2cd28708ec51b1d934aa36
-
SHA512
992c437259485f6c34d311b5715eb21063763ef8181568508f1041b1055b8a7eb8af5206fdf35c1aa40749126c45d68c0ca060c52aab17e57e13375194cb1b15
-
SSDEEP
6144:Aujzmdywb9qES9cXP755n9aCiSaX9zeTxEKjMl:hjpyqEcO5h9aCiSatzeVEN
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Hamachi France.url
-
Size
118B
-
MD5
78264fbc2162bf2b0f28b75fbf36efb9
-
SHA1
63c995df6ca91d7271b24a199e2ca0f715f04e2c
-
SHA256
762577e4509f95d414e72367d25390982795fc7894da5572b1ebd2ea78fb99a0
-
SHA512
0ac2d4241db8b998369a24f8026523f4ee9ec90d99c0743e91058e91693a73690fed99bd05ee9450ef950c7f15ae275aac38434e79f4c598fe22ef313d913285
Score1/10 -
-
-
Target
TeknoGods.dll
-
Size
641KB
-
MD5
4ce565e28623d41708652262a6d41537
-
SHA1
920904c375e74ace072c2b954559b21a38da7916
-
SHA256
23307dd460fb501e9abbe9fc1539fe8619e56294022abf19ce6effe4e2c43b22
-
SHA512
169c2310b9836d112a7250671054f55b3aaf3eace01e61fa2dcfbfd037863a7342e4a71fad89e8ebb869a33d77a5df28bff3754813ca5352d739da6456fb7072
-
SSDEEP
12288:olsxqT0OT378GC7RgkWQwGJGRB2lm88CP96BK1e1DWqIxVu+D4HXJd//1f7Y5Y00:isxqQW37fY6AwGJ5lmXCPQUs1DWqIfu8
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
teknohelper.exe
-
Size
457KB
-
MD5
a5dbf2b7cedc1bc16324b906d6c4e79c
-
SHA1
d78da1c2d3fc9e3a6039537e0901986637b21822
-
SHA256
43fc888c86ca530aadddf0b7a3874981fdbf6ffdfeb17566e669964b8fc158bb
-
SHA512
58a205edfd79458686035063c50afc301771fdbba1150201c64a4fae279a648c05b9055b1279587ab2715b39a4d1446f7c419402634e254a4ac4da679695a518
-
SSDEEP
6144:WpvhSvqHoHPjfx5ONI/nwugiLGCnNYkgRzw/4nVZeg9ZJm1N+SdfmK/SAy0:svhSyILJ5bnwuLL9nN8wy59ZI1wpay0
Score5/10-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-