Resubmissions

27-05-2024 12:35

240527-psl45acc7s 10

27-05-2024 11:51

240527-n1awdsbd75 10

Analysis

  • max time kernel
    55s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-05-2024 12:35

General

  • Target

    13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4.exe

  • Size

    1.8MB

  • MD5

    32f7a46f6cbbc48e7aa90300642081e8

  • SHA1

    db40f5c3bc65b7a672730aa1f4860abb68c69d81

  • SHA256

    13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4

  • SHA512

    f0c5da7152d6e7b36e28f2dd96cadff965cf63a206c3b98bcae3d07e7a092a7ab8224a36bf4e81f6cb5fdf05fdd997c73faf9f2ab8390866c64d58e436d70c91

  • SSDEEP

    49152:KyswxWFbTMC6aujIZwbuErMU49w7QLB4I+QSt:bxWdTMzqwbfHnMpi

Malware Config

Extracted

Family

amadey

Version

4.21

Botnet

49e482

C2

http://147.45.47.70

Attributes
  • install_dir

    1b29d73536

  • install_file

    axplont.exe

  • strings_key

    4d31dd1a190d9879c21fac6d87dc0043

  • url_paths

    /tr8nomy/index.php

rc4.plain

Extracted

Family

redline

Botnet

1

C2

185.215.113.67:40960

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 14 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 32 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • NSIS installer 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4.exe
    "C:\Users\Admin\AppData\Local\Temp\13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe
      "C:\Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe
        "C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2776
        • C:\Users\Admin\AppData\Local\Temp\onefile_2776_133612869542252000\stub.exe
          "C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1864
      • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe
        "C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 72
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2020
      • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe
        "C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2304
        • C:\Users\Admin\AppData\Local\Temp\eng.exe
          "C:\Users\Admin\AppData\Local\Temp\eng.exe"
          4⤵
          • Executes dropped EXE
          PID:276
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k move Descriptions Descriptions.cmd & Descriptions.cmd & exit
            5⤵
            • Loads dropped DLL
            PID:1136
            • C:\Windows\SysWOW64\tasklist.exe
              tasklist
              6⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:572
            • C:\Windows\SysWOW64\findstr.exe
              findstr /I "wrsa.exe opssvc.exe"
              6⤵
                PID:2796
              • C:\Windows\SysWOW64\tasklist.exe
                tasklist
                6⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:2924
              • C:\Windows\SysWOW64\findstr.exe
                findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                6⤵
                  PID:800
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c md 337713
                  6⤵
                    PID:2412
                  • C:\Windows\SysWOW64\findstr.exe
                    findstr /V "EnquiryAnContributionRefers" Tank
                    6⤵
                      PID:2416
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c copy /b Ph + Shoot 337713\r
                      6⤵
                        PID:1688
                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\337713\Rent.pif
                        337713\Rent.pif 337713\r
                        6⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of FindShellTrayWindow
                        • Suspicious use of SendNotifyMessage
                        PID:864
                      • C:\Windows\SysWOW64\PING.EXE
                        ping -n 5 127.0.0.1
                        6⤵
                        • Runs ping.exe
                        PID:352
                • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:1396
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1396 -s 68
                    4⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1432
                • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe"
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1104
                  • C:\Windows\SysWOW64\schtasks.exe
                    "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN Newoff.exe /TR "C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe" /F
                    4⤵
                    • Creates scheduled task(s)
                    PID:1260
                  • C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe"
                    4⤵
                    • Executes dropped EXE
                    PID:1112
                  • C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe
                    "C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2588
                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                      5⤵
                      • Command and Scripting Interpreter: PowerShell
                      PID:2036
                • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2316
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2316 -s 72
                    4⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1428
                • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe
                  "C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of WriteProcessMemory
                  PID:2552
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 96
                    4⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2828
            • C:\Windows\system32\taskeng.exe
              taskeng.exe {71170BED-1E55-47EC-B141-D5D15E357B96} S-1-5-21-268080393-3149932598-1824759070-1000:UHRQKJCP\Admin:Interactive:[1]
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2028
              • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
                C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe
                2⤵
                • Executes dropped EXE
                PID:2652

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

              Filesize

              344B

              MD5

              6cc0c4681b1976b37e9713bb17fce653

              SHA1

              25b4dcddae30991332d6127a9407c0579a169733

              SHA256

              35c81b45afab6fbc150791f6a7281bbcb2cd0e9f266a62dc6b3fe9069e44b53d

              SHA512

              bb9c7e3b6d653de847a8ac30154b73749916ddab8c58260dbc202980161fefee74c8e2ca79692fb6a1a29f364c49c61e54d69f407cf7a4c3e01c13b69ebc0b47

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Britney

              Filesize

              15KB

              MD5

              f5339a664c62f59758f97c27e5f18250

              SHA1

              6fe5f98d6bf4f9271d89d90760cb8abcd5cb0b42

              SHA256

              c7a2bb2a2938356cd5ca3fb1854dbd6972e5cf0482e2958cd82bb076d0f6ac69

              SHA512

              b3bd2f5235059a2c8b9058f888c6f4fffaa2bb603c15dfcde442dd9812a54642868bb3c05b18921da743713351b6ede41f6788e46af543d8e7eb5bdd5f8b8c3b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Defeat

              Filesize

              8KB

              MD5

              5fa2ab455cc5da6e96ab13dd1cd54bb6

              SHA1

              81d893c35c38ae7516582fcc51bce0b1e53f941d

              SHA256

              48c0322e96b304cd939baf6d79183e69069678b89184d7a8c43804769095fad2

              SHA512

              06e3ce00536694b0ee72809480f820e90decbc3b3337ef148fa18caeb502f799485c4c1cd1342cc8debff83e0d76f0e8d13b93a75419631da78aa8c59a4d9f6d

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Descriptions

              Filesize

              10KB

              MD5

              ac7ade76b8beaf6a938d53b3caaba512

              SHA1

              23cd8c38ed38d7619cde18b13b9a5aa39daec08e

              SHA256

              7ae2ec9669a960155327bd0a4bc77910a1b99583b52992d7cd8199e4f6ca2f69

              SHA512

              ff4af167f39599d7fcb3bfc94cd3dce9f0ae025298e43d2fd4a6847881d6317463df3f5610d1ae1dc9fdd6de44f9ce156f5b3543c6df4fe2e6b39a524330e705

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ed

              Filesize

              8KB

              MD5

              f47d19edcc3babcde919e3c34e823295

              SHA1

              6c7258605316c1fb24f8ab4356c4a7124c21b69e

              SHA256

              f455c49ee56b4c49cf34ad0cd07986b5f55b504a8b523ea0eb79f332a255a3d6

              SHA512

              9df301ff7113259e13beebf5a7d1b2270c65c568612539bf26416eab2edb3af591a30279793700a881972de4266e1c9e044db3c0de5b6a1d328b700c3004698c

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Ink

              Filesize

              62KB

              MD5

              2748c48bf017ec2dbf73d2c49e9c9a71

              SHA1

              16f9e9bd7f47653605562daccd7524e5920a58a3

              SHA256

              ed5050fbe794268c6edbe49f8fb226acf859a2c68251c4cb7fc8db4b90ec791d

              SHA512

              c66c9350217284e5a0f8a574cfc910efd798f66315195d716b4ba086595c6c62f2f7b4d505f23af3c9ad615fe6edcaf687404bf81627a39ca356f8392f8a0cdd

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Proc

              Filesize

              13KB

              MD5

              3401516a7640eb223c1b2f7e618c451d

              SHA1

              f865b234e6c653130afb438bc7c5260cde3abf92

              SHA256

              9c279dfab8f0a455caa5e1272a37d523d54af33a1b8b8c661121c175e8815692

              SHA512

              94ecb28fde13608a2a0436c7335347d8c8627fcbdbc8c3cf480d7175c086b544ba068ed566fb9174ed78a318ae6ff4337a863c5a220158e5320d1e237ea1786b

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Spirit

              Filesize

              19KB

              MD5

              e3da5f2550d27668b287d2d8781d72fe

              SHA1

              c492e85131f137f564eebfb92ff0d5208350ba39

              SHA256

              338c5edf0aeef9a14ffcaccfa0463ba901bc4b93e6764175df4f1c148cf87168

              SHA512

              ca550c7c69920203aa53096882fb408a4bd1af8438dcedb02f43bd32d125328e09f31677bd77bbdafee9fadb553fa0fd11e6d2c951482033a2e3b08d2b9b39ff

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Sponsors

              Filesize

              66KB

              MD5

              33e77dd003343a54fb3f3c69cb2bd71c

              SHA1

              caba565823d9841ebdadc743741b03b9f098eec5

              SHA256

              e21533aaf685290de228ac13e8eeb0ed0195192e1c18108ad2dcf9f090b14404

              SHA512

              8ffcaf2432aae89f0e2f1eabe4f42b0cfe7f990914ddc988718d1a41ccdc9f5ab62f2138d32fe8054a70b63596525bbc3a109529d1963de64a9a7f67efb54d7a

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Stayed

              Filesize

              35KB

              MD5

              326771f3c4cabaab267bba316782af10

              SHA1

              3402750abcc2f61054bf751bc7f5228ed3cb49f6

              SHA256

              ce774c5b786f3bcad31d8e9ac06a43747f59d5d9ddcd96db488beb16af3a10dd

              SHA512

              df7d2c48f39833db0da5e4c5bcf2ad3be4ec0e9f60a2b8c6a888a7f74eb8a6b3ad604fffedee2bc2288eabb59d073272fb5edd7733348db70e37163c138e086f

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Switched

              Filesize

              12KB

              MD5

              052bd98c12eb6881b0ef0e5809d1dac8

              SHA1

              5a678738efb5b39b6d6c2503a3da00ecfd3539ae

              SHA256

              12387059317cee313e858a6707c3abc0aad950d383621ec109acffa1a1e3c456

              SHA512

              86394e8351977784a8dc512aca1a0fd874903fd98c7b7418fac13a13ef4d9654141496211d9808bbd033a9340ed00da0c2b612318eff8425f63f561f0fb91321

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Tank

              Filesize

              155B

              MD5

              98d329abe01cf448863e8bc0bd01fddc

              SHA1

              72e41bbce5c1a58c7093fdceb16a4d4ceceedc14

              SHA256

              e37dd741efc2fe87d76ff42c501ab30ce887d19de47834e30d8e96bbb33637f5

              SHA512

              b4b9b3c37ba8dcbf331686e3b8fc8533a2c33e449729cb6b00d21575b9975f59bf3c1357bd3d405ebc40e9a180c21e52a5ed172db01365e639ba6d095905c2ba

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Teaching

              Filesize

              10KB

              MD5

              c5e2683b5a8426fdc75ad224c4c3b432

              SHA1

              24e8fa9fff6afbef893ca612786526de4d3f7866

              SHA256

              42d15faa6a365a2d83698253fedbe72a13cbd5b7cf34234073e743a12d7ee276

              SHA512

              0e5a8bbfad9af2d7646ce1cef789baf1967ffdb70b0303d5507732ea1e1fd98658681d6cbf520bcd129109c032bb12996f5d11d71eb688020d36cb949ddc5642

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Warcraft

              Filesize

              19KB

              MD5

              bf4a4bfb3e732742fed6fad23a0c80bc

              SHA1

              fd1063b5166e6ca2e3ca878c05e017508ec951e0

              SHA256

              1a0a41581f11dadb5a0bc39c9be1fc544f3c178f46d503bc5d28a148764a8c6f

              SHA512

              edb30a9016d0471a02d4a460011f38391b969f268deaeb51e01f392edb0d9c2a3ba0938cfcf5207160c328476df5957a74d04a777a84115d4dc4e2f5bf8cc184

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Williams

              Filesize

              43KB

              MD5

              d4e43ffff41889264559e1ea234696b3

              SHA1

              d0c2f318fc64715d5c7c7ed6612b0383bba202de

              SHA256

              b32991a917dbea6f4c1309dd51c596c6aff925a563df1627f7cf5feb7f234a64

              SHA512

              9a2d5aa2ca6fde40f0635d8b0a2d9e3a14ce3565dcec34192d6c690eda8139795185cf32581990b28ca9853415be1de9a8488f11b902e3ff7910e266ab89405f

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Windsor

              Filesize

              47KB

              MD5

              c734f7c2828866b315e700633b23585a

              SHA1

              e130edbe1002a0ac5dc36b9dc378b3377c25f539

              SHA256

              a64a886e83d6e03b962790b6a1da7c5fa436b7c58ac7e10ae644c367f3363da5

              SHA512

              80481e4810e3107f2a3ff2a54b31cc6c1997a62cc1b6c92dc03c306a7b3a378f232fd57801762f76e5cfbf87e6ca35115b258aa700bbb2439a17877803ff7c24

            • C:\Users\Admin\AppData\Local\Temp\1000002001\buildjudit.exe

              Filesize

              10.7MB

              MD5

              cc7933b503e061ddde7158e108f19cc3

              SHA1

              41b74dc86cc1c4dde7010d3f596aacccf00b3133

              SHA256

              049f48024f31d86c5d8bf56c3da1d7be539c877ad189fb0c5aa9a228601d19eb

              SHA512

              87892a6f3e41ea43157cf13cc6402044ce41fd3d7eb7e456fced894c88d33786a80fa626c1b58436eba94997490256d2675598ba2e54b52affa64f5491c880a2

            • C:\Users\Admin\AppData\Local\Temp\1000004001\33333.exe

              Filesize

              2.1MB

              MD5

              208bd37e8ead92ed1b933239fb3c7079

              SHA1

              941191eed14fce000cfedbae9acfcb8761eb3492

              SHA256

              e1fd277ffc74d67554adce94366e6fa5ebc81f8c4999634bcc3396164ba38494

              SHA512

              a9c3c32573a16b7ca71a12af6e8c8e88502b66bae2465a82dd921fbc6e0c833b9b1c2d436963df189dd9d68568e1be9128826a2e59f1d5fe066b637d2d866715

            • C:\Users\Admin\AppData\Local\Temp\1000005001\fileosn.exe

              Filesize

              304KB

              MD5

              84bf36993bdd61d216e83fe391fcc7fd

              SHA1

              e023212e847a54328aaea05fbe41eb4828855ce6

              SHA256

              8e6d8b5a004c8f21bee1bbe4213c6d78cf80e439b38f587e963e9bb4569aaffa

              SHA512

              bb3241949618ad2d39057e085e150f43b4d41d74efc4658d9c27f8c0ec80420191517a2c0b6b7e225c4e50e02cd031cdfd178e05b9a869847a3c27b210d09caf

            • C:\Users\Admin\AppData\Local\Temp\1000006001\lumma1234.exe

              Filesize

              518KB

              MD5

              c4ffab152141150528716daa608d5b92

              SHA1

              a48d3aecc0e986b6c4369b9d4cfffb08b53aed89

              SHA256

              c28de1802bdbcf51c88cd1a4ac5c1decb0558fa213d83833cf5dbd990b9ae475

              SHA512

              a225e98f2bc27e2add9d34bd850e0e66a27bd1db757c979639a636a6efe412e638025c6e235c36188a24c9af2bde4b17d1dbaa0707dce11411402cd5de8024e9

            • C:\Users\Admin\AppData\Local\Temp\1000007001\Newoff.exe

              Filesize

              418KB

              MD5

              0099a99f5ffb3c3ae78af0084136fab3

              SHA1

              0205a065728a9ec1133e8a372b1e3864df776e8c

              SHA256

              919ae827ff59fcbe3dbaea9e62855a4d27690818189f696cfb5916a88c823226

              SHA512

              5ac4f3265c7dd7d172284fb28c94f8fc6428c27853e70989f4ec4208f9897be91720e8eee1906d8e843ab05798f3279a12492a32e8a118f5621ac5e1be2031b6

            • C:\Users\Admin\AppData\Local\Temp\1000008001\gold.exe

              Filesize

              1.2MB

              MD5

              0b7e08a8268a6d413a322ff62d389bf9

              SHA1

              e04b849cc01779fe256744ad31562aca833a82c1

              SHA256

              d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65

              SHA512

              3d226673e30bbbc27e0a5a6c64bf81eca475c697486b20141df7975bef97901d4865b88f41937f5e3dd00b437f24f91493f80cb69aa366b7a49cd17b26197ba4

            • C:\Users\Admin\AppData\Local\Temp\1000009001\swizzzz.exe

              Filesize

              778KB

              MD5

              05b11e7b711b4aaa512029ffcb529b5a

              SHA1

              a8074cf8a13f21617632951e008cdfdace73bb83

              SHA256

              2aab2ca39749b21877d1c52526009f9f5d251d934205e9f671a9e84cecd55afa

              SHA512

              dde7b561ffb3b9fe71827be9313cd3b83900c3ce76b053d028e84223fba1b06035437b3860a74de7dc2f5d40f0b90bd7d60139701d752c803eb08f362a5d57ff

            • C:\Users\Admin\AppData\Local\Temp\1000284001\toolspub1.exe

              Filesize

              259KB

              MD5

              e7d21b03ec4a4b2dd306071290a2e474

              SHA1

              addd20d4049e52d7a23bb5f060757d8cc960e333

              SHA256

              32118ff63acf10fa7100491a9403eb20aae672ec31005b217c02dae3b6417f01

              SHA512

              83df16d355725e43826a3a0cfffc98737f5d6847e1d0890acfc6b4467f74e4507f7564500e81bfd6b32eca1774020c42c2f98f9b9c733e5cae044102660d447c

            • C:\Users\Admin\AppData\Local\Temp\1000285001\FirstZ.exe

              Filesize

              2.5MB

              MD5

              ffada57f998ed6a72b6ba2f072d2690a

              SHA1

              6857b5f0c40a1cdb0411eb34aa9fe5029bcdb84f

              SHA256

              677f393462e24fb6dba1a47b39e674f485450f91deee6076ccbad9fd5e05bd12

              SHA512

              1de77f83a89935bb3fc3772d5190c3827d76a998785d451e2c0d11a0061cfd28f1b96eccb41b012c76ddda2021e3333a0a647489ae3c6dac10cfb8302abdf33f

            • C:\Users\Admin\AppData\Local\Temp\CabDC9D.tmp

              Filesize

              68KB

              MD5

              29f65ba8e88c063813cc50a4ea544e93

              SHA1

              05a7040d5c127e68c25d81cc51271ffb8bef3568

              SHA256

              1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

              SHA512

              e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

            • C:\Users\Admin\AppData\Local\Temp\TarDD0D.tmp

              Filesize

              177KB

              MD5

              435a9ac180383f9fa094131b173a2f7b

              SHA1

              76944ea657a9db94f9a4bef38f88c46ed4166983

              SHA256

              67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

              SHA512

              1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

            • C:\Users\Admin\AppData\Local\Temp\Tmp50EF.tmp

              Filesize

              2KB

              MD5

              1420d30f964eac2c85b2ccfe968eebce

              SHA1

              bdf9a6876578a3e38079c4f8cf5d6c79687ad750

              SHA256

              f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9

              SHA512

              6fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8

            • C:\Users\Admin\AppData\Local\Temp\onefile_2776_133612869542252000\python310.dll

              Filesize

              4.3MB

              MD5

              c80b5cb43e5fe7948c3562c1fff1254e

              SHA1

              f73cb1fb9445c96ecd56b984a1822e502e71ab9d

              SHA256

              058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

              SHA512

              faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

            • C:\Users\Admin\AppData\Local\Temp\onefile_2776_133612869542252000\stub.exe

              Filesize

              17.9MB

              MD5

              5ad46542eebe9910891770d619d7c4fa

              SHA1

              38b3d062740d4a350c3329f4e5d7627e4a980ef3

              SHA256

              6b0281ff5ec47dfabd801ecde7e55513e556ca6763a557bfb8f2c07b0e739bd5

              SHA512

              426aa5a0453dc0ad2494d43fdfa7d6c35f19770026650db413234859c34e9a1371272942e96d8741594a47832c4fb4391c217911bc65c6434d621f01995d1e64

            • \Users\Admin\AppData\Local\Temp\1b29d73536\axplont.exe

              Filesize

              1.8MB

              MD5

              32f7a46f6cbbc48e7aa90300642081e8

              SHA1

              db40f5c3bc65b7a672730aa1f4860abb68c69d81

              SHA256

              13775e77526c889dccf3eb528a1dc0990441d9aaf5529ba9be9ba56f877940c4

              SHA512

              f0c5da7152d6e7b36e28f2dd96cadff965cf63a206c3b98bcae3d07e7a092a7ab8224a36bf4e81f6cb5fdf05fdd997c73faf9f2ab8390866c64d58e436d70c91

            • \Users\Admin\AppData\Local\Temp\eng.exe

              Filesize

              889KB

              MD5

              fb88fe2ec46424fce9747de57525a486

              SHA1

              19783a58cf0fccb5cc519ebf364c4f4c670d81ce

              SHA256

              cbd9e9333684de488c6fd947583149065d9d95b031d6be7a0440c2581a304971

              SHA512

              885d0ec96eb73c3213c9fe055620c70561ca1aecc5f9cb42cc8e1c26b86c383e92f506e8da4696c7ff7c4feafe09791ab900b2a983528b680224af347ef4b40c

            • memory/1112-177-0x0000000000400000-0x0000000002C9F000-memory.dmp

              Filesize

              40.6MB

            • memory/1676-3-0x00000000000D0000-0x000000000058F000-memory.dmp

              Filesize

              4.7MB

            • memory/1676-5-0x00000000000D0000-0x000000000058F000-memory.dmp

              Filesize

              4.7MB

            • memory/1676-0-0x00000000000D0000-0x000000000058F000-memory.dmp

              Filesize

              4.7MB

            • memory/1676-2-0x00000000000D1000-0x00000000000FF000-memory.dmp

              Filesize

              184KB

            • memory/1676-16-0x00000000070A0000-0x000000000755F000-memory.dmp

              Filesize

              4.7MB

            • memory/1676-15-0x00000000000D0000-0x000000000058F000-memory.dmp

              Filesize

              4.7MB

            • memory/1676-1-0x0000000077B90000-0x0000000077B92000-memory.dmp

              Filesize

              8KB

            • memory/1864-240-0x000000013FCC0000-0x0000000140EF5000-memory.dmp

              Filesize

              18.2MB

            • memory/2136-92-0x0000000000020000-0x0000000000021000-memory.dmp

              Filesize

              4KB

            • memory/2304-110-0x0000000000C60000-0x0000000000CB2000-memory.dmp

              Filesize

              328KB

            • memory/2776-237-0x000000013F750000-0x0000000140225000-memory.dmp

              Filesize

              10.8MB

            • memory/3060-246-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-23-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-22-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-18-0x0000000000EF1000-0x0000000000F1F000-memory.dmp

              Filesize

              184KB

            • memory/3060-20-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-19-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-432-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-17-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-140-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-244-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-242-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-241-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-239-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB

            • memory/3060-238-0x0000000000EF0000-0x00000000013AF000-memory.dmp

              Filesize

              4.7MB