Overview
overview
3Static
static
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...t__.py
windows7-x64
3MerekV3.08...t__.py
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...me.dll
windows7-x64
1MerekV3.08...me.dll
windows10-2004-x64
1MerekV3.08...rek.py
windows7-x64
3MerekV3.08...rek.py
windows10-2004-x64
3MerekV3.08...t__.py
windows7-x64
3MerekV3.08...t__.py
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...me.dll
windows7-x64
1MerekV3.08...me.dll
windows10-2004-x64
1MerekV3.08...rt.bat
windows7-x64
1MerekV3.08...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__init__.py
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
MerekV3.08 Lite/Merek Aimbot/merek.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MerekV3.08 Lite/Merek Aimbot/merek.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
MerekV3.08 Lite/Merek Aimbot/start.bat
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
MerekV3.08 Lite/Merek Aimbot/start.bat
Resource
win10v2004-20240426-en
General
-
Target
MerekV3.08 Lite/Merek Aimbot/merek.py
-
Size
21KB
-
MD5
5037cac6fb4a4bb0260d61b317611d57
-
SHA1
aba4ebe6397e2576c3ce3569b89e3d81352e996d
-
SHA256
e3798dc43a1b3c5e7d6855a2a467e273ef69ce557f572ab68b1c41a709324165
-
SHA512
3494506f2e49b51b3515306381ef006e9dfdc9910000ff074e361dbf0c5d4e4ea7486a1ff492f35223bb6470ddbfe6c7f311a56da3e140141e9262054042bc8d
-
SSDEEP
384:tFJSQ5xC/MKSkF6gWrx9mrdPjznal0qWMbYuKWvJeh7O5zytvLA7RvjO+K:tWYxC/MK3F67rxgxQlWMbYrr7O5sDA78
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000_CLASSES\py_auto_file\shell\Read rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2104 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2104 AcroRd32.exe 2104 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 3008 wrote to memory of 2552 3008 cmd.exe rundll32.exe PID 3008 wrote to memory of 2552 3008 cmd.exe rundll32.exe PID 3008 wrote to memory of 2552 3008 cmd.exe rundll32.exe PID 2552 wrote to memory of 2104 2552 rundll32.exe AcroRd32.exe PID 2552 wrote to memory of 2104 2552 rundll32.exe AcroRd32.exe PID 2552 wrote to memory of 2104 2552 rundll32.exe AcroRd32.exe PID 2552 wrote to memory of 2104 2552 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\merek.py"1⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\merek.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\merek.py"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD564311b73e3edb014b5544cf829c138c8
SHA180753e965762d85a81f495714604782909b1a2ee
SHA2565bbdb2cde8995f20d182eea80771db1cd22105e74125223a7b758f0c8753e118
SHA5129798ed3192182396224dab86e22d84f6a5665f9b81a16accf4d711d8c6df257602198218c86bc5c63522933d9b4eaa91595df376edf85c8f06693a63247be8d6