Overview
overview
10Static
static
10Grabbers-D...in.zip
windows7-x64
1Grabbers-D...in.zip
windows10-2004-x64
1Grabbers-D...obf.py
windows7-x64
3Grabbers-D...obf.py
windows10-2004-x64
3Grabbers-D...ben.py
windows7-x64
3Grabbers-D...ben.py
windows10-2004-x64
3Grabbers-D...ank.py
windows7-x64
3Grabbers-D...ank.py
windows10-2004-x64
3Grabbers-D...ean.py
windows7-x64
3Grabbers-D...ean.py
windows10-2004-x64
3Grabbers-D...una.py
windows7-x64
3Grabbers-D...una.py
windows10-2004-x64
3Grabbers-D...obf.py
windows7-x64
3Grabbers-D...obf.py
windows10-2004-x64
3Grabbers-D...her.py
windows7-x64
3Grabbers-D...her.py
windows10-2004-x64
3Grabbers-D...ts.txt
windows7-x64
1Grabbers-D...ts.txt
windows10-2004-x64
1Grabbers-D...al.gif
windows7-x64
1Grabbers-D...al.gif
windows10-2004-x64
1Grabbers-D...er.jar
windows7-x64
1Grabbers-D...er.jar
windows10-2004-x64
7Grabbers-D...pycdas
ubuntu-22.04-amd64
1Grabbers-D...as.exe
windows7-x64
1Grabbers-D...as.exe
windows10-2004-x64
1Grabbers-D.../pycdc
ubuntu-24.04-amd64
1Grabbers-D...dc.exe
windows7-x64
1Grabbers-D...dc.exe
windows10-2004-x64
1Grabbers-D...in/upx
ubuntu-24.04-amd64
1Grabbers-D...px.exe
windows7-x64
7Grabbers-D...px.exe
windows10-2004-x64
7Grabbers-D...fig.py
windows7-x64
3Analysis
-
max time kernel
453s -
max time network
1177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
31/05/2024, 17:34
Behavioral task
behavioral1
Sample
Grabbers-Deobfuscator-main.zip
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Grabbers-Deobfuscator-main.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Grabbers-Deobfuscator-main/deobf.py
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
Grabbers-Deobfuscator-main/deobf.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Grabbers-Deobfuscator-main/methods/ben.py
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Grabbers-Deobfuscator-main/methods/ben.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Grabbers-Deobfuscator-main/methods/blank.py
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Grabbers-Deobfuscator-main/methods/blank.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Grabbers-Deobfuscator-main/methods/empyrean.py
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
Grabbers-Deobfuscator-main/methods/empyrean.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Grabbers-Deobfuscator-main/methods/luna.py
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Grabbers-Deobfuscator-main/methods/luna.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Grabbers-Deobfuscator-main/methods/notobf.py
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Grabbers-Deobfuscator-main/methods/notobf.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Grabbers-Deobfuscator-main/methods/other.py
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
Grabbers-Deobfuscator-main/methods/other.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Grabbers-Deobfuscator-main/requirements.txt
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Grabbers-Deobfuscator-main/requirements.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Grabbers-Deobfuscator-main/tutorial.gif
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
Grabbers-Deobfuscator-main/tutorial.gif
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
Grabbers-Deobfuscator-main/utils/bin/fernflower.jar
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Grabbers-Deobfuscator-main/utils/bin/fernflower.jar
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdas
Resource
ubuntu2204-amd64-20240522-en
Behavioral task
behavioral24
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdas.exe
Resource
win7-20240215-en
Behavioral task
behavioral25
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdas.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdc
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral27
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdc.exe
Resource
win7-20240508-en
Behavioral task
behavioral28
Sample
Grabbers-Deobfuscator-main/utils/bin/pycdc.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Grabbers-Deobfuscator-main/utils/bin/upx
Resource
ubuntu2404-amd64-20240523-en
Behavioral task
behavioral30
Sample
Grabbers-Deobfuscator-main/utils/bin/upx.exe
Resource
win7-20240221-en
Behavioral task
behavioral31
Sample
Grabbers-Deobfuscator-main/utils/bin/upx.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral32
Sample
Grabbers-Deobfuscator-main/utils/config.py
Resource
win7-20240221-en
General
-
Target
Grabbers-Deobfuscator-main/deobf.py
-
Size
6KB
-
MD5
6b4b50783ef2c9d21751cd38bd9b3bf0
-
SHA1
e400e78d11663a368d9852ccf4f1fcfda3296f17
-
SHA256
46614ff3690379626ab3109954d753d98fd750e4fd1d785172c1a82276ad5f85
-
SHA512
8d00d3a31534a30b588ca932b89b24d64ec8e6c5d853f6f3dfc3dc39634c507b24411cd870aaf96d2b403f12f72508af587b38560f5745f1f913ca3aefd264e3
-
SSDEEP
96:MbzxTlCdC+JU8H7s6pd9rng/mpVt/NSMA8RixUb8RisEP5fAoKqRqhp9:MhZ8bvBgmpHTrBsRqRip9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4768 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Grabbers-Deobfuscator-main\deobf.py1⤵
- Modifies registry class
PID:4864
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4768