General

  • Target

    2024-05-07-11.zip

  • Size

    56.8MB

  • MD5

    018453293158a2cf6478e232de7eed1f

  • SHA1

    acf56164d4f832e95f7a04c1a37b100bfa381000

  • SHA256

    95e217da4c184170c705e9ef317b5d8333713f4f91435d0964e0e2cea03100ab

  • SHA512

    deb6e643ea7695db4426461c4c8f18f39d51ab76fcd1a8f5cfe083f20fc4d40c8891298f7539d2da7c036464e9b2800fc6b61774c22b11919df06f352e7fe5d7

  • SSDEEP

    786432:zVRQwWqfh2RrVmEnMqb+DE7N0uAg8MztpGi7zzPahDyduAqHujEQq:zXQV8qbt7yLg8qtp7zPQ0IHke

Score
10/10

Malware Config

Signatures

  • DCRat payload 1 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Dcrat family
  • Themida packer 1 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unsigned PE 8 IoCs

    Checks for missing Authenticode signature.

Files

  • 2024-05-07-11.zip
    .zip

    Password: infected

  • 01d63645f4c648e12fa693ecc9a926eda29ca031c5d067c687ee65cab67e74e3.exe
    .exe windows:6 windows x86 arch:x86

    2eabe9054cad5152567f0699947a2c5b


    Headers

    Imports

    Sections

  • 14bae02cc31e4fb13f02aa594d65a977f1fdec305089c415985e11903769ae0e.exe
    .exe windows:4 windows x86 arch:x86

    f4639a0b3116c2cfc71144b88a929cfd


    Code Sign

    Headers

    Imports

    Sections

  • Upgather/Balke.bis
  • Upgather/Dekupr.hex
  • Upgather/Lungehindebetndelse.for
  • Upgather/Vektoriel.Eks
  • Upgather/Vidensbankerne.Del
  • populational/Spagettier80.nul
  • populational/Terrasserings173.fol
  • populational/basaltes.tel
  • populational/clinquant.aut
  • populational/illusionisterne.sho
  • populational/indstillingsskala.txt
  • populational/inertiae.gen
  • populational/intervalindsnvringens.cla
  • populational/ladronize.kor
  • populational/procesrenternes.neg
  • populational/smalter.ren
  • populational/snret.par
  • populational/sproglaboratorierne.pat
  • populational/wearishly.poc
  • 173874e3043653514f5c49e0fec9473043c6cf9f6c441d23efd8555f0e9f1b90.unknown
  • 1936394568442f8b917b2316d9379a4ef8524802ece47376757fddea7907bcc3.zip
    .zip
  • TNT Original Invoice.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 402ff605d7f23f20e253e13b8cb1eb7b5b763a00311deba3cf13c9646ae1f397.exe
    .exe windows:6 windows x86 arch:x86


    Headers

    Sections

  • 42b6480c1547bf3867d63dcfec7d5d301d770ce45f82931d922d22def3942d6b.unknown
  • 4d0dfae91fed3f9273356eae54dae047b51e374034fd7e8c1e50066c24add6bf.exe
    .exe windows:5 windows x86 arch:x86

    20dd26497880c05caed9305b3c8b9109


    Code Sign

    Headers

    Imports

    Sections

  • 5401a3332d6bf674b3a25eb23745edd09f943284aa4448f9eb6c53620027f28e.exe
    .exe windows:1 windows x86 arch:x86


    Headers

    Sections

  • 67ac1d2751e9a8c397cbe16b147a86d6d4b09abfe08e905bd622585ea67203e3.zip
    .zip
  • Autoit3.exe
    .exe windows:5 windows x86 arch:x86

    6ae531f3439aee07e850dbb1ac7115a4


    Code Sign

    Headers

    Imports

    Sections

  • script.a3x
  • 6cfe745f03252b83604bf8159f4100e402af25444247e697165c96e2e12f58d2.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • 90f19e1a7843dbee63856899da664d073c2b8fadd0cad368e623d5f7426ba5ef.exe
    .exe windows:5 windows x86 arch:x86

    d10fd842ffa137e5f753dc82e18d2315


    Headers

    Imports

    Sections

  • a3eeef65c42890fd372bc7c627b36d2b9d54a909b809663e0f0392fa34766794.xlsx
    .xlsx office2007
  • a71829e150536a415790ed3f8897daab1da879adef2366f75ec939ec0e749de5.exe
    .exe windows:6 windows x86 arch:x86

    e569e6f445d32ba23766ad67d1e3787f


    Headers

    Imports

    Exports

    Sections

  • db58eb77136d0a35453f949a25df9a2e0d344b389a136f966a1ec2c3c09ef2c4.exe
    .exe windows:1 windows x86 arch:x86


    Headers

    Sections