Static task
static1
Behavioral task
behavioral1
Sample
2024-06-11_5fcd41f3615c59d6ebeb7a15eac265b6_andromeda_bisonal_cobalt-strike_enigma_gh0st_hacktools_h.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
2024-06-11_5fcd41f3615c59d6ebeb7a15eac265b6_andromeda_bisonal_cobalt-strike_enigma_gh0st_hacktools_h.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-06-11_5fcd41f3615c59d6ebeb7a15eac265b6_andromeda_bisonal_cobalt-strike_enigma_gh0st_hacktools_hammertoss_jrat_laqma_lockbit_maccontrol_predator-pain_protux_redleaves_webshell-shell_xtreme_zxxz
-
Size
3.9MB
-
MD5
5fcd41f3615c59d6ebeb7a15eac265b6
-
SHA1
569a581a64562d4d8dc7c5bdb0f7d2602f8be939
-
SHA256
66031d9e394a14260d8bc1156612e06fcffe2740b31ec74770b46cc311037349
-
SHA512
ff918a98b5fcec9c6ea546ce4b8f892fd6f20ac3d822ce83858b95f204ba21e34336a4eb77829449e2c2e5f8cade24a3da6a08c82844f078fef95aa86df627bf
-
SSDEEP
24576:KZB8kRYu+++BoVigAPnG1bbnfxlFFtv7/AofeN1dEBzLA3+7QcaG62vHTzIOWJFx:ajY9YI6Ff/zfekZEYHPwFN7sy
Malware Config
Signatures
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_Binary_References_Browsers -
Detects executables built or packed with PS2EXE 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_PS2EXE -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Detects executables containing URLs to raw contents of a Github gist 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
Detects executables containing bas64 encoded gzip files 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_Embedded_Gzip_B64Encoded_File -
Detects executables packed with Dotfuscator 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Dotfuscator -
Detects executables packed with Themida 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_Themida -
Detects executables packed with VMProtect. 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_VMProtect -
Detects executables referencing combination of virtualization drivers 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_VM_Evasion_VirtDrvComb -
Detects executables referencing many IR and analysis tools 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_References_SecTools -
Detects executables referencing virtualization MAC addresses 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_VM_Evasion_MACAddrComb -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-06-11_5fcd41f3615c59d6ebeb7a15eac265b6_andromeda_bisonal_cobalt-strike_enigma_gh0st_hacktools_hammertoss_jrat_laqma_lockbit_maccontrol_predator-pain_protux_redleaves_webshell-shell_xtreme_zxxz
Files
-
2024-06-11_5fcd41f3615c59d6ebeb7a15eac265b6_andromeda_bisonal_cobalt-strike_enigma_gh0st_hacktools_hammertoss_jrat_laqma_lockbit_maccontrol_predator-pain_protux_redleaves_webshell-shell_xtreme_zxxz.exe windows:0 windows x64 arch:x64
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ