Resubmissions

17-04-2024 12:39

240417-pvnqqsgh5z 7

17-04-2024 12:39

240417-pvnezafc92 7

17-04-2024 12:39

240417-pvmtfafc88 7

17-04-2024 12:38

240417-pvj3jsgh5v 6

17-04-2024 12:38

240417-pvjrsagh5s 6

16-04-2024 13:52

240416-q6kznadb91 6

Analysis

  • max time kernel
    273s
  • max time network
    277s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-04-2024 12:38

General

  • Target

    5301d33697d41ef717efa88cf8bb93fcce33a15a4f8280c1e95e8276325455bd.exe

  • Size

    230KB

  • MD5

    d6f9162872d922af8a5132aa86e2f195

  • SHA1

    8cea7dd201bed9e282d010027e3ea9bc0977ed5b

  • SHA256

    5301d33697d41ef717efa88cf8bb93fcce33a15a4f8280c1e95e8276325455bd

  • SHA512

    64440492554ef094e6204244968126811c6396cfba2d0f65733c48fd6e76e92fac6ada95912127712d9258cf7c8e24acffb2f1d4fda102bb618e8be3b842625d

  • SSDEEP

    6144:GeZ5aVBzQh/9hnth+r4GNG+dFib/xECWzYA80DVCWzXYYDJUYF1wFZoM/vQDZf6Q:mzzQhW

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Uses Tor communications 1 TTPs

    Malware can proxy its traffic through Tor for more anonymity.

Processes

  • C:\Users\Admin\AppData\Local\Temp\5301d33697d41ef717efa88cf8bb93fcce33a15a4f8280c1e95e8276325455bd.exe
    "C:\Users\Admin\AppData\Local\Temp\5301d33697d41ef717efa88cf8bb93fcce33a15a4f8280c1e95e8276325455bd.exe"
    1⤵
    • Adds Run key to start application
    PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads