Overview
overview
10Static
static
3file/amdhip64.dll
windows7-x64
1file/amdhip64.dll
windows10-2004-x64
1file/concrt140.dll
windows7-x64
1file/concrt140.dll
windows10-2004-x64
1file/msvcp140.dll
windows7-x64
1file/msvcp140.dll
windows10-2004-x64
1file/res_m..._a.pyc
windows7-x64
3file/res_m..._a.pyc
windows10-2004-x64
3file/setup.exe
windows7-x64
10file/setup.exe
windows10-2004-x64
10General
-
Target
file.zip
-
Size
11.2MB
-
Sample
240619-tlsesaxgpr
-
MD5
a9b1ef15039a2b481babf79fa4aa0631
-
SHA1
30cfe3ebdd542a18a18a4947e8f1e09e216ffc1c
-
SHA256
1faeb4df786aa22a7231c6360beb3db37527b8bc363e0897a58aa8e844e503ff
-
SHA512
ca01615d0fbc1d23838debfa6234a66a38c7a7aa49a4833137c7f9d62e2d8725d500dca4c701c1158c30c4282198227af46d76c5f865110e4da89627f046385e
-
SSDEEP
196608:hpAAbVYYaVoh2891wynJjP12ueys6++j7FHFtStVMggF3TQm7jSkMtjJXRBu1:hptaYaqh289jJXps4MtVjk3UQSZb/u1
Static task
static1
Behavioral task
behavioral1
Sample
file/amdhip64.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
file/amdhip64.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
file/concrt140.dll
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
file/concrt140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
file/msvcp140.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
file/msvcp140.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
file/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
file/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
file/setup.exe
Resource
win7-20240611-en
Behavioral task
behavioral10
Sample
file/setup.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
file/amdhip64.dll
-
Size
10.1MB
-
MD5
da6bba744ffe35bd63e61ef2824ff15d
-
SHA1
54f12b2bc458c72e071cdff727c4a2f7a33d0ab5
-
SHA256
66d5725519eec9f0c16696c9bcf32ba3442551f36ec4bdb17e12f6e0d24027c7
-
SHA512
74ba3f3c817fb0519b42e7f68ac8d87692e461c1a8529ae86051bbf891350bab05023046da6b69648681e26656624c97bac9707938511190e1dab8afd45ded4a
-
SSDEEP
98304:FqFhXse/Y7jUHRRFcwETkorMg/696ffjZMXNDVjCXN2MX2:AXs37juRTcwETkGMUjZMXNDVjCXN2V
Score1/10 -
-
-
Target
file/concrt140.dll
-
Size
309KB
-
MD5
31f210ed5c6f2d8faa1d896cda18584b
-
SHA1
5444d919f5014fb6bf58cefc6f01088c32a24a00
-
SHA256
5393f592cded7bd8ae07b2afc3efdcc4a0b05f7e8e74380a267398266fc02d41
-
SHA512
d39aa7acfd982759825b537a9ca5b04e6cdd9c0a28089e0f666ae4b75e84e2e2e58180103da38bea79efe3252cb9f1932efa69b64461cb76173645e8b6ddf3f6
-
SSDEEP
6144:Ylm+bq4hSdOec4xWMXdtvo4KbrniIzb7wQjnWzgCE33g:pmP/eJXzvSCzW3g
Score1/10 -
-
-
Target
file/msvcp140.dll
-
Size
576KB
-
MD5
a11a1d761d757d367146f0f772632d8c
-
SHA1
9fd3eee4c4111dc386510a930192d56a2e938dfe
-
SHA256
2cc02c5e6654aa9175d5963f811cac222f4a2604dc28553139c675b1a78995a7
-
SHA512
6fbbb77766ee9846d6d3bde2ced5eeaafe721de5524a410a4821dfa6c08edbd00905bec2b9237b8f7986d6d06dbe444c5845130193da537cadaf29ea784c48e1
-
SSDEEP
12288:fFrCZUcfGI/O+bE9krdFFM5lle0dkM4X2n08ukSIAg6wQEKZm+jWodEEVrR+:9rCZUNYX2nSkGg6wQEKZm+jWodEE9R+
Score1/10 -
-
-
Target
file/res_mods/1.23.0.0/scripts/client/gui/mods/mod_a.pyc
-
Size
114KB
-
MD5
a2f3ded45da8870e93e5d2186dab27e8
-
SHA1
3f8e0cddecc3827b33ec02cd78d192c18f1ddf82
-
SHA256
fc19237a4e9ae65829dbde384ce0de2c78b22d9577384dded9d4cde569a12742
-
SHA512
438621491061c7f14f59c48d0d2fdd637a17c058df13417e21d660d81632dbb826a6144032f6f9192ab9bb0afb46b8f6cf3982879dc9942261c2538dbd17187c
-
SSDEEP
3072:k6BVH7SBjeSCbupKVfG2yQJ23J+Svsy9k/TukuPMh:zrbKeWmDyQ+13kOPMh
Score3/10 -
-
-
Target
file/setup.exe
-
Size
795.0MB
-
MD5
21412da795adc066433ad4e7d9b05cf6
-
SHA1
4bbf545299a12ee9beacfa0d1d5cb513df3a7717
-
SHA256
6b2f4d60b5cefc36928e357bf7f3608bd5673eecfa5f139525ca469e8d5e0251
-
SHA512
7e0431f141154f5f9d6b052d9b7b5c9e294449a26fb12bda4a5a8ef71e49d027c40f1a3ebc6a1835c0ee6881e7e1815f2780a99042b548c889398c33ea40498c
-
SSDEEP
98304:1pWj//s8raQoDJbI5t1lGRjm8v/VkoIShICZ+zmAaWr:3Wj/08+FJS0mckQyQ+
Score10/10-
Modifies firewall policy service
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-