Overview
overview
3Static
static
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...ts.bat
windows7-x64
1MerekV3.08...ts.bat
windows10-2004-x64
1MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...bot.py
windows7-x64
3MerekV3.08...bot.py
windows10-2004-x64
3MerekV3.08...t__.py
windows7-x64
3MerekV3.08...t__.py
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...me.dll
windows7-x64
1MerekV3.08...me.dll
windows10-2004-x64
1MerekV3.08...rek.py
windows7-x64
3MerekV3.08...rek.py
windows10-2004-x64
3MerekV3.08...t__.py
windows7-x64
3MerekV3.08...t__.py
windows10-2004-x64
3MerekV3.08...10.pyc
windows7-x64
3MerekV3.08...10.pyc
windows10-2004-x64
3MerekV3.08...me.dll
windows7-x64
1MerekV3.08...me.dll
windows10-2004-x64
1MerekV3.08...rt.bat
windows7-x64
1MerekV3.08...rt.bat
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:46
Static task
static1
Behavioral task
behavioral1
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MerekV3.08 Lite/Merek Aimbot/__pycache__/keyauth.cpython-310.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
MerekV3.08 Lite/Merek Aimbot/install_requirements.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MerekV3.08 Lite/Merek Aimbot/lib/aimbot.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__init__.py
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
MerekV3.08 Lite/Merek Aimbot/lib/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
MerekV3.08 Lite/Merek Aimbot/merek.py
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MerekV3.08 Lite/Merek Aimbot/merek.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__init__.py
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__init__.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/__pycache__/__init__.cpython-310.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
MerekV3.08 Lite/Merek Aimbot/pyarmor_runtime_000000/pyarmor_runtime.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
MerekV3.08 Lite/Merek Aimbot/start.bat
Resource
win7-20231129-en
Behavioral task
behavioral24
Sample
MerekV3.08 Lite/Merek Aimbot/start.bat
Resource
win10v2004-20240426-en
General
-
Target
MerekV3.08 Lite/Merek Aimbot/lib/__pycache__/aimbot.cpython-310.pyc
-
Size
7KB
-
MD5
1600e4aa01c3395c20c32e50376a8eb8
-
SHA1
6097a7d5eb71bf374d4b9fd78ed2f4f7497fece8
-
SHA256
fb3ddedf915a53ca980945bf47c19919ca9715121cc962de3d04fa11be5b5d87
-
SHA512
8dc852cd6f7edf15d6efa07ac8887ce0c3cfc597fc2bae351acb289b69538dee10b3a320754068a2e04c074df8355a1a5f6ed260afc1459d3b181b1e7831287e
-
SSDEEP
192:MwL7DLzlxs2eNKSLcJm23DqHpQguEANeLIvjS+zQWe5mwH+jD7OW/NZO9qGP+xO9:Ms7DLzD1eNKSL4yMND/G+KWkq6+09
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\pyc_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000_CLASSES\.pyc\ = "pyc_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
AcroRd32.exepid process 2748 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
AcroRd32.exepid process 2748 AcroRd32.exe 2748 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
cmd.exerundll32.exedescription pid process target process PID 2180 wrote to memory of 2772 2180 cmd.exe rundll32.exe PID 2180 wrote to memory of 2772 2180 cmd.exe rundll32.exe PID 2180 wrote to memory of 2772 2180 cmd.exe rundll32.exe PID 2772 wrote to memory of 2748 2772 rundll32.exe AcroRd32.exe PID 2772 wrote to memory of 2748 2772 rundll32.exe AcroRd32.exe PID 2772 wrote to memory of 2748 2772 rundll32.exe AcroRd32.exe PID 2772 wrote to memory of 2748 2772 rundll32.exe AcroRd32.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\__pycache__\aimbot.cpython-310.pyc"1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\__pycache__\aimbot.cpython-310.pyc2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MerekV3.08 Lite\Merek Aimbot\lib\__pycache__\aimbot.cpython-310.pyc"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5bc2e9cb84239b7a30b2611de244afbc7
SHA1d2a4b1a0a0ed1e73d43dd9308c53488627122081
SHA2562d8807c547a009fb87d194acf09ed96ed0fab49d76351b7a02ac5df4632b829b
SHA512135720c9b0081991c87979f2cc0af6885db0162fffe9f90e4b476b4e1e74ce9c0f61c21b5dc9df6abfaa16eb1f5e1475774e143a7423cb23d0bff7ecc8e681f7