Overview
overview
10Static
static
8Spyware/Ag...la.exe
windows7-x64
4Spyware/Ag...la.exe
windows10-2004-x64
4MaterialDe...rs.dll
windows7-x64
1MaterialDe...rs.dll
windows10-2004-x64
1MaterialDe...pf.dll
windows7-x64
1MaterialDe...pf.dll
windows10-2004-x64
1Microsoft....re.dll
windows7-x64
1Microsoft....re.dll
windows10-2004-x64
1SharpSteam.dll
windows7-x64
1SharpSteam.dll
windows10-2004-x64
1System.Man...on.dll
windows7-x64
1System.Man...on.dll
windows10-2004-x64
1UWPHook.exe
windows7-x64
1UWPHook.exe
windows10-2004-x64
1VDFParser.dll
windows7-x64
1VDFParser.dll
windows10-2004-x64
1Spyware/HawkEye.exe
windows7-x64
10Spyware/HawkEye.exe
windows10-2004-x64
10Spyware/Kakwa.doc
windows7-x64
10Spyware/Kakwa.doc
windows10-2004-x64
10Spyware/bu...op.exe
windows7-x64
7Spyware/bu...op.exe
windows10-2004-x64
7General
-
Target
Spyware.zip
-
Size
5.8MB
-
Sample
240303-bmnh4sbd58
-
MD5
02017dab46a248b6c69982c35afdfa21
-
SHA1
2958978be43fa2b1ab2c7076182282b15d17e2dc
-
SHA256
4d104f2a3cb1812c62f80e35f7287d91b68c0163377001779b10e88c974f038d
-
SHA512
53a2b54347ff53c33a88b677f2100bb7873cea268c34de93901ae7fb85666692f3736bef4ab4f57920aa1c7f54fd24184f8b1c79062ef2b7b65a7b0ad8453184
-
SSDEEP
98304:Lm8Ju50KRWWU2sWXO34FmXbLgyRjVhURALh5tgS+1jc9KjBzz4eOl6:a8qw4VCXgyBVhUL2isec6
Behavioral task
behavioral1
Sample
Spyware/AgentTesla.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Spyware/AgentTesla.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MaterialDesignColors.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
MaterialDesignColors.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MaterialDesignThemes.Wpf.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
MaterialDesignThemes.Wpf.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Microsoft.Management.Infrastructure.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Microsoft.Management.Infrastructure.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
SharpSteam.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
SharpSteam.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
System.Management.Automation.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
System.Management.Automation.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
UWPHook.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
UWPHook.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
VDFParser.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
VDFParser.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
Spyware/HawkEye.exe
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Spyware/HawkEye.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
Spyware/Kakwa.doc
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Spyware/Kakwa.doc
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
Spyware/butterflyondesktop.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Spyware/butterflyondesktop.exe
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Spyware/AgentTesla.exe
-
Size
2.8MB
-
MD5
cce284cab135d9c0a2a64a7caec09107
-
SHA1
e4b8f4b6cab18b9748f83e9fffd275ef5276199e
-
SHA256
18aab0e981eee9e4ef8e15d4b003b14b3a1b0bfb7233fade8ee4b6a22a5abbb9
-
SHA512
c45d021295871447ce60250ff9cbeba2b2a16a23371530da077d6235cfe5005f10fa228071542df3621462d913ad2f58236dc0c0cb390779eef86a10bba8429f
-
SSDEEP
49152:4HEHIHP6z9goDKncJkYgCB7UODoQvjZMElnp0zGMPokHz5xZtYgxsdexHwNbUMb:ZdRFBmnQ7rjZMYSzGbkHzXxWeu6W
Score4/10 -
-
-
Target
MaterialDesignColors.dll
-
Size
292KB
-
MD5
39367419516f5f3df9ab1f9e5d0bbcd5
-
SHA1
762c9acdb09bfdf40e700645131999202abbc871
-
SHA256
976eea4567656d536a6344b3834f958f2b9e27401b94c643681770437d5abc68
-
SHA512
20ea8a64a14579ef5403eae8a6345afa0f9b12229fdb8bc869f7a8cdd4e785093b9f60f9445be738266a161d75f53a8b8e42a69b2f9b4cbf4684f5dbf5113ae9
-
SSDEEP
1536:2ZJb/nKyGMbYrE4jKg4J4A+0MDR1TU7fKoVxbYCCMIRFxcE5istk0uWE1Ci4oggj:2DDrYrE6oJU907fKoVxb+Y
Score1/10 -
-
-
Target
MaterialDesignThemes.Wpf.dll
-
Size
7.1MB
-
MD5
fbd761926164043ac71ee9b83ab37fd1
-
SHA1
38d44b0f40fa31124ba139adeb6f7adc7e53ee19
-
SHA256
013a42b8c6ffa29e2198eed4faf6168247b6550a4c4ed5d82023a1d82a08e27e
-
SHA512
c2a0be2d8b5b98dc19ad167aadc1e68905ad259e3b0e020cfb95a8a816964549c98a9c5bc44b8f4640147bfd8555e799216b8dba13bf0eefed9582782da552d2
-
SSDEEP
98304:OXJDntBksKY+ND3WyA4+TLVei10vMzPv8/4C8B5XVS49Xzy83IiEcJMrCR2fShTf:onJ45/9iD54+V11bFv4z
Score1/10 -
-
-
Target
Microsoft.Management.Infrastructure.dll
-
Size
36KB
-
MD5
3998804194188c25df75f505ac5c531a
-
SHA1
6b15b2d779e7c46e31fcc864fc1ef326fb3d2b50
-
SHA256
cbec9a910488cadbad860c850ceae521a2a346619c5a9da579e5051e270f114c
-
SHA512
d7cd7457c753190fd1ae5386a62dffbe5907ace02227ef873f4c890f4a4e987914fb94ab1ec8318f48a76fc55cfe8e7de83b75cfcbec0bb8ff0e18d2d956abdc
-
SSDEEP
768:droEzop6gC66+666M66666+vvvvvvvvvvvvvF66666K66n6666666666ZpkLEyXD:nNLEyXCL
Score1/10 -
-
-
Target
SharpSteam.dll
-
Size
5KB
-
MD5
aa6d1a798829536972ac5ba7d01d0c77
-
SHA1
8ec399faa7c428e9962f116b2baf6efca636e8c8
-
SHA256
74a89211b2a1bcf84796785fb93647ac6a1e5efbb2bbd14ddcee2e50c15153a4
-
SHA512
a937d3840bd6102c321ebaa06e01bda575d383aa152c1c0bfc8faa870109a7672a9957c50a6a259ecf481b47450df1814d7d152334e396780fe15760281be870
-
SSDEEP
48:6O/89d6LfKuNpIoijbm2EjW6NINM/OMeZSCo1bumqMzxSu4tM/klXWRO6uFF:0uNpI7j6jWyPgysCcl8
Score1/10 -
-
-
Target
System.Management.Automation.dll
-
Size
352KB
-
MD5
835e9ede7e7c774e7a2d56cfdf6e9b17
-
SHA1
a43ed886b68c6ee913da85df9ad2064f1d81c470
-
SHA256
c3a5868584a777422cebcf31d6718fd2b26d5e2314d3b5ba6d8e47aa40faba0c
-
SHA512
74284fd44497beb74326d11a0f63d96aff20aa44cfa8385f6b63b7e6743403c36e2ea4fb0d991767117a97d320e04d2b21f0a4730916244af4ffdaf51e834a26
-
SSDEEP
3072:d/SDqTIE+QQVVBCTmAG17iT+Lt8D/1L2iLZdrs81sDotEKjRmarzRm+5gSBZqoEJ:d/PXS6WK2iLZdgotEKj9rzRmkgSBAot
Score1/10 -
-
-
Target
UWPHook.exe
-
Size
831KB
-
MD5
9aa4929291eff01d727b9fb88bba080c
-
SHA1
820321cd5e8fbf81db43f024e93ee190811b8906
-
SHA256
d55baebe14b8e68afd44227d3ae7307fa07dbbdd91331b892edde93fd027ca6e
-
SHA512
b52e18c3c8f4f30479c974e4c19e00cacdb850df6e631aeed553cbfee77703e664136385ff7a6b38c90ddf18e0c29a08c51264ad7696c5d8278b8876d3b7fe1f
-
SSDEEP
12288:O4IH5S68xqbLLjo9LfPw3ytl8dSkc6ZubYpE0EjcUBS4BJ:O35R8xf143yte6epEdjcUBzBJ
Score1/10 -
-
-
Target
VDFParser.dll
-
Size
15KB
-
MD5
17351a51f020d8352c3d8144bf89ab40
-
SHA1
80a46c4dd6be71f789183daaa6677629654ebe68
-
SHA256
503804161cd8ff82756292f6d4d24107e6c8ac4cf43df89378f7b5d3782cc2ad
-
SHA512
ab5b16f296d787a72fed58bcb00e1295a543d4fb5eff00cb82c065fe336d18a572884003e2b519f5d4880546ce592aa9d903ad096a7d78dedf5f72b76034c983
-
SSDEEP
384:GEI1akrMmNix7WLptEEEEEEEEEEEEEEEEEEEDl/hJOhE75MuODENhtN:lyMvWLptEEEEEEEEEEEEEEEEEEE5JwaJ
Score1/10 -
-
-
Target
Spyware/HawkEye.exe
-
Size
232KB
-
MD5
60fabd1a2509b59831876d5e2aa71a6b
-
SHA1
8b91f3c4f721cb04cc4974fc91056f397ae78faa
-
SHA256
1dacdc296fd6ef6ba817b184cce9901901c47c01d849adfa4222bfabfed61838
-
SHA512
3e842a7d47b32942adb936cae13293eddf1a6b860abcfe7422d0fb73098264cc95656b5c6d9980fad1bf8b5c277cd846c26acaba1bef441582caf34eb1e5295a
-
SSDEEP
3072:BMhIBKH7j7DzQi7y5bvl4YAbdY9KWvwn7XHMzqEOf64CEEl64HBVdGXPKD:BMh5H7j5g54YZKXoxOuEEl64HZAi
Score10/10-
Chimera
Ransomware which infects local and network files, often distributed via Dropbox links.
-
Chimera Ransomware Loader DLL
Drops/unpacks executable file which resembles Chimera's Loader.dll.
-
Renames multiple (2001) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Spyware/Kakwa.doc
-
Size
72KB
-
MD5
9a039302b3f3109607dfa7c12cfbd886
-
SHA1
9056556d0d63734e0c851ab549b05ccd28cf4abf
-
SHA256
31ca294ddd253e4258a948cf4d4b7aaaa3e0aa1457556e0e62ee53c22b4eb6f0
-
SHA512
8a174536b266b017962406076fe54ec3f4b625517b522875f233cd0415d5d7642a1f8ff980fb42d14dab1f623e3f91a735adefa2b9276d1622fa48e76952d83c
-
SSDEEP
768:jpXWjJYl3KBMOOqIcWS6bMr3kQc5Ch6KEBTOfz4:jFqOdLS6D5Ch6KEMfz
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
-
-
Target
Spyware/butterflyondesktop.exe
-
Size
2.8MB
-
MD5
1535aa21451192109b86be9bcc7c4345
-
SHA1
1af211c686c4d4bf0239ed6620358a19691cf88c
-
SHA256
4641af6a0071e11e13ad3b1cd950e01300542c2b9efb6ae92ffecedde974a4a6
-
SHA512
1762b29f7b26911a7e6d244454eac7268235e2e0c27cd2ca639b8acdde2528c9ddf202ed59ca3155ee1d6ad3deba559a6eaf4ed74624c68688761e3e404e54da
-
SSDEEP
49152:5aA7f7tlVmdqK23H2bpHI4Qs5ABV9WRHZRsgI82lcHGAaKLinXBgJ:Q+VMkX224QsWBq5SfARGRgJ
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-