General
-
Target
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d
-
Size
3.8MB
-
Sample
240229-lvt1zadf97
-
MD5
23c77d427c009060cc6aaa23f2898b67
-
SHA1
3a0b484c87b7ece658176060c080e1504d7f9ae4
-
SHA256
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d
-
SHA512
ef0c37c02465ab89f5b957b05afe0e0ea62de6f2f1ad4f877fa20cd5f723e955eff22a579379970cb9e7b8deff98d0446a4c33ea7c4c8ea219512902695293ba
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/bmlwXVZ4FB:5+R/eZADUXR
Behavioral task
behavioral1
Sample
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
bitrat
1.38
pvstub.ddns.net:43763
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
MSCrypt
-
install_file
brclient2.exe
-
tor_process
tor
Targets
-
-
Target
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d
-
Size
3.8MB
-
MD5
23c77d427c009060cc6aaa23f2898b67
-
SHA1
3a0b484c87b7ece658176060c080e1504d7f9ae4
-
SHA256
3aceda8f6f9466ab3fa0c94b3de9d2d4ba5a7b95226340265832d8ae7213536d
-
SHA512
ef0c37c02465ab89f5b957b05afe0e0ea62de6f2f1ad4f877fa20cd5f723e955eff22a579379970cb9e7b8deff98d0446a4c33ea7c4c8ea219512902695293ba
-
SSDEEP
98304:d77Pmq33rE/JDLPWZADUGer7B6iY74M/bmlwXVZ4FB:5+R/eZADUXR
Score10/10-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-