Overview
overview
10Static
static
10OTP Bypass...p-diff
ubuntu-18.04-amd64
1OTP Bypass...p-diff
debian-9-armhf
1OTP Bypass...p-diff
debian-9-mips
1OTP Bypass...p-diff
debian-9-mipsel
1OTP Bypass...p-grep
ubuntu-18.04-amd64
1OTP Bypass...p-grep
debian-9-armhf
1OTP Bypass...p-grep
debian-9-mips
1OTP Bypass...p-grep
debian-9-mipsel
1OTP Bypass...in.exe
windows7-x64
7OTP Bypass...in.exe
windows10-2004-x64
7OTP Bypass...up.exe
windows7-x64
7OTP Bypass...up.exe
windows10-2004-x64
7)-(��.pyc
windows7-x64
)-(��.pyc
windows10-2004-x64
Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 18:51
Behavioral task
behavioral1
Sample
OTP Bypasser v1/bin/pip-diff
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral2
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral3
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral4
Sample
OTP Bypasser v1/bin/pip-diff
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral5
Sample
OTP Bypasser v1/bin/pip-grep
Resource
ubuntu1804-amd64-20240226-en
Behavioral task
behavioral6
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral7
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral8
Sample
OTP Bypasser v1/bin/pip-grep
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral9
Sample
OTP Bypasser v1/login.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
OTP Bypasser v1/login.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
OTP Bypasser v1/setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
OTP Bypasser v1/setup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
)-(��.pyc
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
)-(��.pyc
Resource
win10v2004-20231215-en
General
-
Target
OTP Bypasser v1/setup.exe
-
Size
6.8MB
-
MD5
fe54252e4c4478026cad14f5325868c6
-
SHA1
29c48f94978b19dc17eb4073098df0db8fe83fc5
-
SHA256
aa394718a5dd2fae8ae1eaa9b880c5461ad886f3a41fc1443349a582083c7b1b
-
SHA512
7d2388361de1c0ba256b303e60e38eb431ff0fa6ce1a2881b97b50b9d750f4a664e95efc91739107a42b8f8d7748852c17d32893ca5d2a3143c2fbfa8501312d
-
SSDEEP
196608:EsV1Y7B6ylnlPzf+JiJCsmFMvon6hVvvJD:kBRlnlPSa7mmvo+JD
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2820 setup.exe -
resource yara_rule behavioral11/files/0x00050000000195a3-21.dat upx behavioral11/memory/2820-23-0x000007FEF6090000-0x000007FEF667A000-memory.dmp upx -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2820 2492 setup.exe 27 PID 2492 wrote to memory of 2820 2492 setup.exe 27 PID 2492 wrote to memory of 2820 2492 setup.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\setup.exe"C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\setup.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\setup.exe"C:\Users\Admin\AppData\Local\Temp\OTP Bypasser v1\setup.exe"2⤵
- Loads dropped DLL
PID:2820
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD51e76961ca11f929e4213fca8272d0194
SHA1e52763b7ba970c3b14554065f8c2404112f53596
SHA2568a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b