Overview
overview
10Static
static
10SampDroid ...er.exe
windows7-x64
SampDroid ...er.exe
windows10-2004-x64
$PLUGINSDI...er.dll
windows7-x64
1$PLUGINSDI...er.dll
windows10-2004-x64
1$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3LICENSES.c...m.html
windows7-x64
1LICENSES.c...m.html
windows10-2004-x64
1SampDroid.exe
windows7-x64
7SampDroid.exe
windows10-2004-x64
7d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1launcher/SA-MP.exe
windows7-x64
3launcher/SA-MP.exe
windows10-2004-x64
3SAMPUninstall.exe
windows7-x64
7SAMPUninstall.exe
windows10-2004-x64
7bass.dll
windows7-x64
1bass.dll
windows10-2004-x64
1rcon.exe
windows7-x64
1rcon.exe
windows10-2004-x64
1samp.dll
windows7-x64
1samp.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1resources/...64.exe
windows7-x64
1Analysis
-
max time kernel
90s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2024 06:06
Behavioral task
behavioral1
Sample
SampDroid Launcher.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SampDroid Launcher.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
LICENSES.chromium.html
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
LICENSES.chromium.html
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
SampDroid.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
SampDroid.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
d3dcompiler_47.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral16
Sample
ffmpeg.dll
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
ffmpeg.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral18
Sample
launcher/SA-MP.exe
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
launcher/SA-MP.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral20
Sample
SAMPUninstall.exe
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
SAMPUninstall.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral22
Sample
bass.dll
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
bass.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral24
Sample
rcon.exe
Resource
win7-20231215-en
Behavioral task
behavioral25
Sample
rcon.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral26
Sample
samp.dll
Resource
win7-20231215-en
Behavioral task
behavioral27
Sample
samp.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral28
Sample
libEGL.dll
Resource
win7-20231215-en
Behavioral task
behavioral29
Sample
libEGL.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral30
Sample
libGLESv2.dll
Resource
win7-20231215-en
Behavioral task
behavioral31
Sample
libGLESv2.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral32
Sample
resources/app.asar.unpacked/node_modules/rcedit/bin/rcedit-x64.exe
Resource
win7-20231215-en
General
-
Target
SAMPUninstall.exe
-
Size
56KB
-
MD5
bffa504cd63305418858b150faa8f408
-
SHA1
86886fd2378aa33935cf684f056454859713aed4
-
SHA256
d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
-
SHA512
6b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019
-
SSDEEP
1536:HLXB65939tY6HBg4sXJOgdLeAyN/dIM6su:HLk395hYXJOceAlMM
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2192 Au_.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 Au_.exe -
Loads dropped DLL 1 IoCs
pid Process 2192 Au_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 2 IoCs
resource yara_rule behavioral21/files/0x0007000000023220-3.dat nsis_installer_1 behavioral21/files/0x0007000000023220-3.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2192 2540 SAMPUninstall.exe 83 PID 2540 wrote to memory of 2192 2540 SAMPUninstall.exe 83 PID 2540 wrote to memory of 2192 2540 SAMPUninstall.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"C:\Users\Admin\AppData\Local\Temp\SAMPUninstall.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
538B
MD5dfb7e7195499de8ffef7cdc8bc674602
SHA1de439c8d0d8a5c32a1dce87ccc36cd44d8c1964f
SHA2563740709e00dbfbe56880055fbce6aafc86568451b468c40e1eab56e11a512134
SHA512578e3079a01e15e0c3888bdb4dc24c1f761eabefb752241dcdcaae36042905867610cdb27519942584dd64ab3db14360c1631c726e429cbd48f547abc5d741da
-
Filesize
579B
MD570ec4b19b66f3dd4c5b1a44bf03d0cd8
SHA1507cf95a63eafca980d4ff19c3e23b43bcb79dbd
SHA256ebd9134fce140daee3af5c6638c844766d4a0e60cc898258f1c696707ae3a316
SHA512747e545e0c03a7ff3d4d7c4523d65e0be51a2acca68f231995196c3046e994c681d70353ee00831f5378500bc2e736044ac675edcb50324c4d720b904d8f0692
-
Filesize
56KB
MD5bffa504cd63305418858b150faa8f408
SHA186886fd2378aa33935cf684f056454859713aed4
SHA256d00f8bf2eaa1994b0064d7b14fc987b0aab9b3c440a4177257ee2d3217fe6d3b
SHA5126b8958a4ccffce02ba8e4390f66121a02116e2b2ef9c4baa2eea62b8acfe380d0c0dd5e773f83b7062467a34019612d3f8a531e1a4ffcefb769de964cbf02019