Behavioral task
behavioral1
Sample
15809488978.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15809488978.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232.vbs
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232.vbs
Resource
win10v2004-20240226-en
General
-
Target
15809488978.zip
-
Size
36.9MB
-
MD5
a6aa5293ee6039899beb4e336e00f5a0
-
SHA1
097767653d76952b74850560aa255062c4dc9313
-
SHA256
b1e259552c673105db392361c38015e916ebf429521967fe8ca1f0c353a430dd
-
SHA512
1392a76de1ec949e10b0d8178a0502ad94cf424625aaf34a7fbac8347aa7a010c25aa1f3ba1c62388f827f1458245981c476b09dfbb826cbb5dc440ddb0b6c8c
-
SSDEEP
786432:FSUAS+uiT3i0a9hk0F7u82qUas1nfUaRO/k2vdYwr0mlq7z1j03LGIqeGlNFr2b:sUJ0a96iunq3sjRwk2FYbmcjZJeGlyb
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
Ardamax family
-
Ardamax main executable 1 IoCs
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 family_ardamax -
Contains code to disable Windows Defender 1 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 disable_win_def -
Matiex Main payload 1 IoCs
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 family_matiex -
Matiex family
-
Metasploit family
-
Snake Keylogger payload 1 IoCs
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 family_snakekeylogger -
Snakekeylogger family
-
StormKitty payload 1 IoCs
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 family_stormkitty -
Stormkitty family
-
XMRig Miner payload 1 IoCs
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 xmrig -
Xmrig family
-
Office document contains embedded OLE objects 1 IoCs
Detected embedded OLE objects in Office documents.
resource yara_rule static1/unpack001/b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232 office_ole_embedded
Files
-
15809488978.zip.zip
Password: infected
-
b2bdf26fd0b7ebd3cfb16df43b738177d1e2d356e733ffbb59a05e5b5d857232.vbs