Analysis

  • max time kernel
    1775s
  • max time network
    185s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240611-en
  • resource tags

    arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11/06/2024, 23:25

General

  • Target

    UDP Flashflood v1.0/UDP Flashflood v1.0 by BrutuS.exe

  • Size

    48KB

  • MD5

    5e2bed0f69ceef0fbd181db6de19968a

  • SHA1

    fd9b1c2b9df237cb8f81ff74a4de9dbd83b25690

  • SHA256

    cf272129a609777249355a1a1bef6d0748f0d096f01ce753fca83c0087062199

  • SHA512

    ead9984e551897877838256b521486bc54990526b00451f05ed887453c4f0ce471f4fffde58bce8e36c545c121b8221df08e5dcf7378f2443f47f631fbf514f6

  • SSDEEP

    384:IHZ8f14uBhVwLpxtaZSJCI/Qu5GbcelVCkOe:Iaf2uB7ZS4WqceDCX

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

  • C:\Users\Admin\AppData\Local\Temp\UDP Flashflood v1.0\UDP Flashflood v1.0 by BrutuS.exe
    "C:\Users\Admin\AppData\Local\Temp\UDP Flashflood v1.0\UDP Flashflood v1.0 by BrutuS.exe"
    1⤵
      PID:1732

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1732-0-0x00007FFFDF025000-0x00007FFFDF026000-memory.dmp

            Filesize

            4KB

          • memory/1732-1-0x000000001B430000-0x000000001B4D6000-memory.dmp

            Filesize

            664KB

          • memory/1732-2-0x00007FFFDED70000-0x00007FFFDF711000-memory.dmp

            Filesize

            9.6MB

          • memory/1732-3-0x00007FFFDED70000-0x00007FFFDF711000-memory.dmp

            Filesize

            9.6MB

          • memory/1732-4-0x00007FFFDF025000-0x00007FFFDF026000-memory.dmp

            Filesize

            4KB

          • memory/1732-5-0x00007FFFDED70000-0x00007FFFDF711000-memory.dmp

            Filesize

            9.6MB