Analysis

  • max time kernel
    1049s
  • max time network
    207s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    11-06-2024 23:44

General

  • Target

    UDP Flashflood v1.0/UDP Flashflood v1.0 by BrutuS.exe

  • Size

    48KB

  • MD5

    5e2bed0f69ceef0fbd181db6de19968a

  • SHA1

    fd9b1c2b9df237cb8f81ff74a4de9dbd83b25690

  • SHA256

    cf272129a609777249355a1a1bef6d0748f0d096f01ce753fca83c0087062199

  • SHA512

    ead9984e551897877838256b521486bc54990526b00451f05ed887453c4f0ce471f4fffde58bce8e36c545c121b8221df08e5dcf7378f2443f47f631fbf514f6

  • SSDEEP

    384:IHZ8f14uBhVwLpxtaZSJCI/Qu5GbcelVCkOe:Iaf2uB7ZS4WqceDCX

Score
9/10

Malware Config

Signatures

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Unexpected DNS network traffic destination 64 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

Processes

  • C:\Users\Admin\AppData\Local\Temp\UDP Flashflood v1.0\UDP Flashflood v1.0 by BrutuS.exe
    "C:\Users\Admin\AppData\Local\Temp\UDP Flashflood v1.0\UDP Flashflood v1.0 by BrutuS.exe"
    1⤵
      PID:2092

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2092-0-0x00007FF8C2CC5000-0x00007FF8C2CC6000-memory.dmp

      Filesize

      4KB

    • memory/2092-1-0x000000001B670000-0x000000001B716000-memory.dmp

      Filesize

      664KB

    • memory/2092-2-0x00007FF8C2A10000-0x00007FF8C33B1000-memory.dmp

      Filesize

      9.6MB

    • memory/2092-3-0x00007FF8C2A10000-0x00007FF8C33B1000-memory.dmp

      Filesize

      9.6MB

    • memory/2092-4-0x00007FF8C2CC5000-0x00007FF8C2CC6000-memory.dmp

      Filesize

      4KB

    • memory/2092-5-0x00007FF8C2A10000-0x00007FF8C33B1000-memory.dmp

      Filesize

      9.6MB