Overview
overview
10Static
static
10RGF-main.zip
windows10-2004-x64
10RGF-main/Input.zip
windows10-2004-x64
1RoBrute-ma...ICENSE
windows10-2004-x64
1RoBrute-ma...DME.md
windows10-2004-x64
3RoBrute-ma...ute.py
windows10-2004-x64
3RoBrute-ma...Lib.py
windows10-2004-x64
3RoBrute-ma...ib.pyc
windows10-2004-x64
3RoBrute-ma...ss.lst
windows10-2004-x64
3RoBrute-ma...y.yaml
windows10-2004-x64
3RoBrute-ma...ts.txt
windows10-2004-x64
1RoBrute-ma...cks.py
windows10-2004-x64
3RoBrute-ma...ks.pyc
windows10-2004-x64
3RGF-main/RBF.exe
windows10-2004-x64
10RGF-main/README.md
windows10-2004-x64
3Behavioral task
behavioral1
Sample
RGF-main.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
RGF-main/Input.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
RoBrute-master/LICENSE
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
RoBrute-master/README.md
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
RoBrute-master/RoBrute.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
RoBrute-master/mainLib.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
RoBrute-master/mainLib.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
RoBrute-master/pass.lst
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
RoBrute-master/proxy.yaml
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
RoBrute-master/requirements.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
RoBrute-master/socks.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
RoBrute-master/socks.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
RGF-main/RBF.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
RGF-main/README.md
Resource
win10v2004-20240226-en
General
-
Target
RGF-main.zip
-
Size
54KB
-
MD5
7bcc565dfb0ce789f9a984870a64414c
-
SHA1
7918e05800b7d02be5aa3670259709fde7f5c268
-
SHA256
33461d788a33b88bed3d489826f9fb766cae421f322b81c5eb861718a1dea7bb
-
SHA512
0490c139cd781e827fa35e55d21d887990febb2ab158baac005755ae1825904cf8f2971a10e75e135fa350c40ac841815ddeb2fd5c9da2d7b350e9c509f027b0
-
SSDEEP
768:C2wkbG+ulfxDBcy7hCPWLp7BKgRfIa700K/2x6qKDcqVQ1WEx7HyWKpIpTtKP1ZC:CN1LPBcmKWLp7BTei/qVgRHfKJLYd9vr
Malware Config
Extracted
mercurialgrabber
https://discord.com/api/webhooks/975244014364270683/FZnH_sfT1E7Axl_7pfCffp86xK6BWVM_UXXb74CN2p4kpHxH_6kuQsuzlglxNPVfnIm6
Signatures
-
Mercurialgrabber family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/RGF-main/RBF.exe
Files
-
RGF-main.zip.zip
Password: infected
-
RGF-main/Input.zip.zip
Password: infected
-
RoBrute-master/LICENSE
-
RoBrute-master/README.md
-
RoBrute-master/RoBrute.py.py .sh linux
-
RoBrute-master/mainLib.py
-
RoBrute-master/mainLib.pyc
-
RoBrute-master/pass.lst
-
RoBrute-master/proxy.yaml
-
RoBrute-master/requirements.txt
-
RoBrute-master/socks.py.py .js
-
RoBrute-master/socks.pyc
-
RGF-main/RBF.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
.text Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RGF-main/README.md