Resubmissions
12/04/2024, 14:32
240412-rv9pbabb85 1012/04/2024, 14:31
240412-rvxdzseb9w 1012/04/2024, 14:30
240412-rvkp7abb72 1012/04/2024, 14:30
240412-rvffgabb69 1012/04/2024, 14:30
240412-rve5pseb8y 709/04/2024, 07:35
240409-je21jahf78 809/04/2024, 07:35
240409-je2d1ahf76 1009/04/2024, 07:35
240409-je2d1ach91 709/04/2024, 07:35
240409-jev7zshf73 814/10/2023, 04:04
231014-enc1jshf56 8General
-
Target
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
-
Size
1.9MB
-
Sample
240409-je2d1ahf76
-
MD5
3bf670e5e1c152674b1a6f0fd3ed67f1
-
SHA1
11c6df477c1d8b95d7c6313f05cd759df34cdc4e
-
SHA256
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d
-
SHA512
3cae3752e25a268842a91e87d7dc721f9aee7059e06bcd3e7d6aa90ec6d1b2fe59cad62963f452bbe850af31a2710dd429bad436e10756857ec90fa21bdbb968
-
SSDEEP
49152:/jdg0nPwhegnBrxZPlH/+ui3T4Ga0e0MTDD4yfYyHs8Xu3/:720nPcnZxZPZgeccD4yfnn+/
Static task
static1
Behavioral task
behavioral1
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
Resource
win11-20240221-en
Malware Config
Extracted
Protocol: ftp- Host:
karaoke-soft.com - Port:
21 - Username:
[email protected] - Password:
2111021110
Extracted
Protocol: ftp- Host:
picaxeforum.co.uk - Port:
21 - Username:
[email protected] - Password:
facebook12
Extracted
Protocol: ftp- Host:
picaxeforum.co.uk - Port:
21 - Username:
goodworkmen - Password:
facebook12
Extracted
Protocol: ftp- Host:
picaxeforum.co.uk - Port:
21 - Username:
admin - Password:
facebook12
Targets
-
-
Target
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d_JC.exe
-
Size
1.9MB
-
MD5
3bf670e5e1c152674b1a6f0fd3ed67f1
-
SHA1
11c6df477c1d8b95d7c6313f05cd759df34cdc4e
-
SHA256
6b232f1c2c79c4e701fa0cff8d9459badb912447df00bd7467a89ff6b2b17e0d
-
SHA512
3cae3752e25a268842a91e87d7dc721f9aee7059e06bcd3e7d6aa90ec6d1b2fe59cad62963f452bbe850af31a2710dd429bad436e10756857ec90fa21bdbb968
-
SSDEEP
49152:/jdg0nPwhegnBrxZPlH/+ui3T4Ga0e0MTDD4yfYyHs8Xu3/:720nPcnZxZPZgeccD4yfnn+/
Score10/10-
Contacts a large (902) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Adds Run key to start application
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-