Analysis

  • max time kernel
    75s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2024 22:30

General

  • Target

    setup.exe

  • Size

    1.8MB

  • MD5

    0b3d97b11e440029d52b34ae6798cfbc

  • SHA1

    f6ec97cac5dd7fd597abc69befee89262b1d0ec1

  • SHA256

    5b225235d021e0bd9075a79ed7eeaa67e3a360ba9de6c4d2db3ee23026a26a2d

  • SHA512

    2ec03b588aa23728734423e6619cbd541c768c28d5630f195a58eab08153f783f8a301adf8c68c72cde7dcf1a9823b09fa5135bd4f7ea1eee539d249d1ebfca7

  • SSDEEP

    49152:TEfZfgzCiQwmi93LJuL18dSTvE7VinUNCeqOEK5BW6a4+:Tm2Qo7JuLASTcCoCXK5BW6at

Malware Config

Extracted

Family

amadey

Version

8254624243

Botnet

e76b71

C2

http://77.91.77.81

Attributes
  • install_dir

    8254624243

  • install_file

    axplong.exe

  • strings_key

    90049e51fabf09df0d6748e0b271922e

  • url_paths

    /Kiru9gu/index.php

rc4.plain

Extracted

Family

redline

Botnet

newbild

C2

185.215.113.67:40960

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

95.142.46.3:4449

95.142.46.3:7000

Mutex

zlgcqgmshzbvhurfz

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

redline

Botnet

06-20-24

C2

91.92.255.143:45786

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Detects Monster Stealer. 1 IoCs
  • Monster

    Monster is a Golang stealer that was discovered in 2024.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 4 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 8 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 29 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 54 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 6 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 12 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 3 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe
      "C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Checks BIOS information in registry
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe
        "C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
      • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe
        "C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 52
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:884
      • C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe
        "C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2956
        • C:\Users\Admin\AppData\Local\Temp\da_protected.exe
          "C:\Users\Admin\AppData\Local\Temp\da_protected.exe"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of AdjustPrivilegeToken
          PID:492
          • C:\Users\Admin\AppData\Local\Temp\wdpddb.exe
            "C:\Users\Admin\AppData\Local\Temp\wdpddb.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in Program Files directory
            PID:1612
            • C:\Program Files (x86)\%tepm%\t_protected.exe
              "C:\Program Files (x86)\%tepm%\t_protected.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of SetWindowsHookEx
              PID:296
      • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe
        "C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 84
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2976
      • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe
        "C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe"
        3⤵
        • Executes dropped EXE
        PID:1868
      • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe
        "C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1720
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          4⤵
            PID:1748
        • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe
          "C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Drops file in Windows directory
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe
            "C:\Users\Admin\AppData\Local\Temp\b66a8ae076\Hkbsse.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:2052
            • C:\Users\Admin\AppData\Local\Temp\1000012001\1.exe
              "C:\Users\Admin\AppData\Local\Temp\1000012001\1.exe"
              5⤵
              • Executes dropped EXE
              • Checks SCSI registry key(s)
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              PID:2780
        • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe
          "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          PID:1112
          • C:\Users\Admin\AppData\Local\Temp\onefile_1112_133634826351904000\stub.exe
            "C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:904
        • C:\Users\Admin\AppData\Local\Temp\1000092001\legs.exe
          "C:\Users\Admin\AppData\Local\Temp\1000092001\legs.exe"
          3⤵
          • Executes dropped EXE
          PID:2836
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 64
            4⤵
            • Loads dropped DLL
            • Program crash
            PID:1692
        • C:\Users\Admin\AppData\Local\Temp\1000093001\0x3fg.exe
          "C:\Users\Admin\AppData\Local\Temp\1000093001\0x3fg.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of FindShellTrayWindow
          PID:1500
          • C:\Users\Admin\AppData\Local\Temp\28feeece5c\Hkbsse.exe
            "C:\Users\Admin\AppData\Local\Temp\28feeece5c\Hkbsse.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Adds Run key to start application
            PID:1980
            • C:\Users\Admin\AppData\Roaming\1000001000\uYtF.exe
              "C:\Users\Admin\AppData\Roaming\1000001000\uYtF.exe"
              5⤵
              • Executes dropped EXE
              PID:712
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:304
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:1972
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2572
              • C:\Windows\system32\powercfg.exe
                C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                6⤵
                • Power Settings
                • Suspicious use of AdjustPrivilegeToken
                PID:2088
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe delete "xjuumoinznsp"
                6⤵
                • Launches sc.exe
                PID:2016
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe create "xjuumoinznsp" binpath= "C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe" start= "auto"
                6⤵
                • Launches sc.exe
                PID:352
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe stop eventlog
                6⤵
                • Launches sc.exe
                PID:3024
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start "xjuumoinznsp"
                6⤵
                • Launches sc.exe
                PID:880
            • C:\Users\Admin\AppData\Local\Temp\1000003001\utyj.exe
              "C:\Users\Admin\AppData\Local\Temp\1000003001\utyj.exe"
              5⤵
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              PID:2372
            • C:\Users\Admin\AppData\Local\Temp\1000005001\serieta.exe
              "C:\Users\Admin\AppData\Local\Temp\1000005001\serieta.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              PID:2116
              • C:\Users\Admin\AppData\Local\Temp\natura.exe
                "C:\Users\Admin\AppData\Local\Temp\natura.exe"
                6⤵
                • Executes dropped EXE
                PID:2392
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "HJUWGNAT"
                  7⤵
                  • Launches sc.exe
                  PID:1256
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "HJUWGNAT" binpath= "C:\ProgramData\agmxykvocxft\etuamactyjne.exe" start= "auto"
                  7⤵
                  • Launches sc.exe
                  PID:448
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  7⤵
                  • Launches sc.exe
                  PID:2984
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "HJUWGNAT"
                  7⤵
                  • Launches sc.exe
                  PID:2588
              • C:\Users\Admin\AppData\Local\Temp\nautr.exe
                "C:\Users\Admin\AppData\Local\Temp\nautr.exe"
                6⤵
                • Executes dropped EXE
                PID:1928
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe delete "OYGYWFTH"
                  7⤵
                  • Launches sc.exe
                  PID:2896
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe create "OYGYWFTH" binpath= "C:\ProgramData\dnbdcucuyzqs\pseaptzkxyms.exe" start= "auto"
                  7⤵
                  • Launches sc.exe
                  PID:2788
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe stop eventlog
                  7⤵
                  • Launches sc.exe
                  PID:2864
                • C:\Windows\system32\sc.exe
                  C:\Windows\system32\sc.exe start "OYGYWFTH"
                  7⤵
                  • Launches sc.exe
                  PID:2900
              • C:\Users\Admin\AppData\Local\Temp\Notepad.exe
                "C:\Users\Admin\AppData\Local\Temp\Notepad.exe"
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                PID:1404
                • C:\Users\Admin\AppData\Local\Temp\Notepad.exe
                  "C:\Users\Admin\AppData\Local\Temp\Notepad.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  PID:1528
    • C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe
      C:\ProgramData\ajdiewdhnaew\wfbrmcwrltkl.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1780
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1028
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1880
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        2⤵
        • Power Settings
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
      • C:\Windows\explorer.exe
        explorer.exe
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
    • C:\ProgramData\agmxykvocxft\etuamactyjne.exe
      C:\ProgramData\agmxykvocxft\etuamactyjne.exe
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      PID:1536
      • C:\Windows\system32\conhost.exe
        C:\Windows\system32\conhost.exe
        2⤵
          PID:1300
        • C:\Windows\system32\conhost.exe
          conhost.exe
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2420
      • C:\ProgramData\dnbdcucuyzqs\pseaptzkxyms.exe
        C:\ProgramData\dnbdcucuyzqs\pseaptzkxyms.exe
        1⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        PID:2996
        • C:\Windows\system32\conhost.exe
          C:\Windows\system32\conhost.exe
          2⤵
            PID:2572

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          1KB

          MD5

          a266bb7dcc38a562631361bbf61dd11b

          SHA1

          3b1efd3a66ea28b16697394703a72ca340a05bd5

          SHA256

          df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

          SHA512

          0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

          Filesize

          242B

          MD5

          d79ee19a6d66e7709e9deca3b2858742

          SHA1

          4c2aaf4d5c4a43df44cd6360e1c4583c630baa33

          SHA256

          7dade24cee3cb22b85de442e361e56ecfafdd6ed9e1347a7b37d7fb989d55c94

          SHA512

          6e06b3017307b2d2070bb840ca4225dc1535ae554ea7fb838b9747f3a121796d03d39ca4b7c80e5ce304632b0d80a7a586a16061243febf3421c1a5de9c828a4

        • C:\Users\Admin\AppData\Local\Temp\1000003001\utyj.exe

          Filesize

          297KB

          MD5

          f135803381618638b68506450fca1797

          SHA1

          c2311e46f1deb8213cb155ff8a68fac30eb6766c

          SHA256

          bf38a350365e6dc02b2b906e330c8cea297a1ad89e752c50b4a0a201e79a7600

          SHA512

          8266101235e6d3d0ee7b1d80cf504b66efa25a3ad9e147d2ece9cf8c60334d9329bf4d56d04ef34913fd2425334bc2e3419cad97cb8118ae5a406fcb410b8e5d

        • C:\Users\Admin\AppData\Local\Temp\1000005001\serieta.exe

          Filesize

          12.1MB

          MD5

          448effb3d85fb89c7f190cb99ffa73fc

          SHA1

          cbbb99017a213a46791ce3712f1297ba4a1ae72a

          SHA256

          f8c91e7edae8c63c29dd51becb5c806305c83cf19bc576401a6802f3cd4aed66

          SHA512

          026d5af0234d577dbc505a90fbedd6ce90a216ca557e527e0b3f66c00474ec8dac6bffd3a3ad6211ecee02ff557e99aa01d97b9626b73f4ced5ee78241461c9c

        • C:\Users\Admin\AppData\Local\Temp\1000007001\redline123123.exe

          Filesize

          297KB

          MD5

          0efd5136528869a8ea1a37c5059d706e

          SHA1

          3593bec29dbfd333a5a3a4ad2485a94982bbf713

          SHA256

          7c21c1f3063ba963818542036a50f62ac7494ad422e7088897b55c61306ec74e

          SHA512

          4ac391812634107e4a4318c454a19e7c34abfc1f97acc9bcd0fac9a92c372e5ebfe809e5c433479142537762ed633564bc690b38fc268b169498d6a54249e3fe

        • C:\Users\Admin\AppData\Local\Temp\1000008001\upd.exe

          Filesize

          1.7MB

          MD5

          e8a7d0c6dedce0d4a403908a29273d43

          SHA1

          8289c35dabaee32f61c74de6a4e8308dc98eb075

          SHA256

          672f24842aeb72d7bd8d64e78aaba5f3a953409ce21cfe97d3a80e7ef67f232a

          SHA512

          c8bf2f42f7bcf6f6b752ba5165c57ee99d4b31d5ba48ce1c2651afdb8bc37a14f392253f3daa0e811116d11d4c9175dc55cfb1baac0c30a71a18e1df17e73770

        • C:\Users\Admin\AppData\Local\Temp\1000012001\1.exe

          Filesize

          239KB

          MD5

          e0a475f2ac0e9c3dad905d8ce84f62cb

          SHA1

          6b789faafed3e4e2d318c9ec9300f9ba3c865374

          SHA256

          b59e52b83b0a0cde0085b3ba306316a86a845a974cbeaf45da905476b6db53bb

          SHA512

          a23d30a9fc9d2560fe37b6d9ab334576e956412ca7841f63f051a54aa77a4e3bcf6b1b5e4e28304b06fde02028b20c6ff1297f750c4735281168164d3397cf46

        • C:\Users\Admin\AppData\Local\Temp\1000025001\deep.exe

          Filesize

          3.6MB

          MD5

          864d1a4e41a56c8f2e7e7eec89a47638

          SHA1

          1f2cb906b92a945c7346c7139c7722230005c394

          SHA256

          1c733ad7ed4f89826d675196abcc3a6133bb8f67c69d56e5fcb601ad521ff9f8

          SHA512

          547a441369636e2548c7f8f94c3972269e04d80ee5a26803cc222942b28e457be908126fb4ff6bfde2a063ea1ef74ecba2aaceb58c68fba5c4fddcea5fbd91d3

        • C:\Users\Admin\AppData\Local\Temp\1000035001\gold.exe

          Filesize

          522KB

          MD5

          70a578f7f58456e475facd69469cf20a

          SHA1

          83e147e7ba01fa074b2f046b65978f838f7b1e8e

          SHA256

          5c8d556e39269b22e63ba9c941ff306bb043bc35125ba08787617577231b381a

          SHA512

          707ed48b45978d26faaf3544bf22912461503d6e4b1a077cbb7c3a8abd2f1eb3fec16b2786a79ae4db2dfec92f662ece1998bc142706d2b482599fb6191563c0

        • C:\Users\Admin\AppData\Local\Temp\1000047001\lummac2.exe

          Filesize

          310KB

          MD5

          6e3d83935c7a0810f75dfa9badc3f199

          SHA1

          9f7d7c0ea662bcdca9b0cda928dc339f06ef0730

          SHA256

          dc4f0a8e3d12c98eac09a42bd976579ccc1851056d9de447495e8be7519760ed

          SHA512

          9f6b22bc9d0306a69d3c5bab83c7603fa23925c12089f9608772602ab2c4c0908cda2a3d9592fc0fab4aaff209ef41d3e2a931511ce9dfd027691e8dce9ad9b9

        • C:\Users\Admin\AppData\Local\Temp\1000063001\drivermanager.exe

          Filesize

          3.6MB

          MD5

          c28a2d0a008788b49690b333d501e3f3

          SHA1

          6a25fdb8613db00b09d4d6e1ad302c20c7f7e2c4

          SHA256

          f61712dccccf8f19c6dbf0dfb7c7c0be9eb2f13d3381ee94e4cb6cb70ffb5f5a

          SHA512

          455923a63e60b6079d7e0af2bfae5f922b205d024def456ae95158ef1bfcdbc4f56e24b4421a2203f4618d0ea29e229e331c7ee0d7881ee8ebac83fa72f5d788

        • C:\Users\Admin\AppData\Local\Temp\1000064001\NewLatest.exe

          Filesize

          415KB

          MD5

          07101cac5b9477ba636cd8ca7b9932cb

          SHA1

          59ea7fd9ae6ded8c1b7240a4bf9399b4eb3849f1

          SHA256

          488385cd54d14790b03fa7c7dc997ebea3f7b2a8499e5927eb437a3791102a77

          SHA512

          02240ff51a74966bc31cfcc901105096eb871f588efaa9be1a829b4ee6f245bd9dca37be7e2946ba6315feea75c3dce5f490847250e62081445cd25b0f406887

        • C:\Users\Admin\AppData\Local\Temp\1000070001\monster.exe

          Filesize

          10.7MB

          MD5

          3f4f5c57433724a32b7498b6a2c91bf0

          SHA1

          04757ff666e1afa31679dd6bed4ed3af671332a3

          SHA256

          0608a7559f895fab33ae65bbfbdc5bebd21eea984f76e1b5571c80906824d665

          SHA512

          cf572ca616b4f4e6e472e33e8d6d90b85d5885fa64d8bca4507450d66d65057efa771f58c31ea13f394fd0e7b0ff2fcaa9d54c61f28b27b98a79c27bc964f935

        • C:\Users\Admin\AppData\Local\Temp\1000092001\legs.exe

          Filesize

          659KB

          MD5

          bbd06263062b2c536b5caacdd5f81b76

          SHA1

          c38352c1c08fb0fa5e67a079998ef30ebc962089

          SHA256

          1875275da8d576fd9962c5b2bd9fe0e4b4d188caad9549125c8a64ecaf9308c9

          SHA512

          7faa4e18cc9d7d82cb8efe8494668e05f75ddd5a8c9c9a058b2246a786a60d7761168862220b70820b02f38f196cfb5f106db36cdcfd5a5a3f9dfd01654eb9ad

        • C:\Users\Admin\AppData\Local\Temp\1000093001\0x3fg.exe

          Filesize

          415KB

          MD5

          c4aeaafc0507785736e000ff7e823f5e

          SHA1

          b1acdee835f02856985a822fe99921b097ed1519

          SHA256

          b1d5b1e480a5731caacc65609eaf069622f1129965819079aa09bc9d96dadde5

          SHA512

          fbaefbce3232481490bce7b859c6c1bafd87ee6d952a2be9bf7c4ed25fe8fc9aff46c2246e247aa05ce8e405831a5905ca366c5333ede0af48f9a6287479a12d

        • C:\Users\Admin\AppData\Local\Temp\8254624243\axplong.exe

          Filesize

          1.8MB

          MD5

          0b3d97b11e440029d52b34ae6798cfbc

          SHA1

          f6ec97cac5dd7fd597abc69befee89262b1d0ec1

          SHA256

          5b225235d021e0bd9075a79ed7eeaa67e3a360ba9de6c4d2db3ee23026a26a2d

          SHA512

          2ec03b588aa23728734423e6619cbd541c768c28d5630f195a58eab08153f783f8a301adf8c68c72cde7dcf1a9823b09fa5135bd4f7ea1eee539d249d1ebfca7

        • C:\Users\Admin\AppData\Local\Temp\Tar9D30.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\natura.exe

          Filesize

          2.5MB

          MD5

          c4632a10a964a334e4c4c252283a4256

          SHA1

          8538000e2e116045f9698e41f9fe1b28eaf86e00

          SHA256

          a665723cd4b03528486a8128548d7fe825f2ff2e91e9d773ae2d5edb0bdaa8bd

          SHA512

          947cc709af9b0497dd80ea1c777c7c113f6c0e958aa34847b4b64edbdbe49af11c17e3cc68cbc3e1b86dd0f961f35b0cda12ee95c3e29866fbf5a57aa2f62a03

        • C:\Users\Admin\AppData\Local\Temp\nautr.exe

          Filesize

          2.5MB

          MD5

          e0df3f75617bc94f9094d476a2a55ff0

          SHA1

          6b66cdb4dbe1f05e53d0e0e34b3e2d71b0098e00

          SHA256

          dd483c5a9e8d886f4189b170cca29d0074352c2d1ee45525d6574e35677a4548

          SHA512

          099d539cf6548c3421ec1eda1124e5b97dbdaa465d48d1945ddb87bd899d74aaa2e2a1ec9f0743088b05ad48583480c73f368624c9d27e85a4a533eb928f2729

        • C:\Users\Admin\AppData\Local\Temp\onefile_1112_133634826351904000\python310.dll

          Filesize

          4.3MB

          MD5

          c80b5cb43e5fe7948c3562c1fff1254e

          SHA1

          f73cb1fb9445c96ecd56b984a1822e502e71ab9d

          SHA256

          058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20

          SHA512

          faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

        • C:\Users\Admin\AppData\Local\Temp\onefile_1112_133634826351904000\stub.exe

          Filesize

          18.0MB

          MD5

          ed9d600d2e640eaa1c915dc516da9988

          SHA1

          9c10629bc0255009434e64deaee5b898fc3711e2

          SHA256

          2b8a2a3c53a019ca674287e1513a8e0851f2181699e37f385541537801ed1d41

          SHA512

          9001454bfabf2d9621ad997726aad281638c4b2e8dc134994f479d391bae91c5d0aa24317e85e8e91956cc34357e1ed9d6682f2fe9a023d74b003a420325db68

        • C:\Users\Admin\AppData\Local\Temp\wdpddb.exe

          Filesize

          3.5MB

          MD5

          0ce7f9d2494b190678628616a6e3dab4

          SHA1

          ef77a7fa1b654c0fdf93fca0d862365f05c6fd9f

          SHA256

          39bccc832b167ea6418f9c095f867e77ce8ba5c53f660758aaa9b8f86f07404f

          SHA512

          40ed2afbf64619babc0a4ceff66869b1a8790f1d7568a70230518f6cf96286f56f0ca8b7959c75bd570c5aff239e8bba7425346394c2e0a577d396c24546b887

        • C:\Users\Admin\AppData\Roaming\1000001000\uYtF.exe

          Filesize

          2.5MB

          MD5

          4691a9fe21f8589b793ea16f0d1749f1

          SHA1

          5c297f97142b7dad1c2d0c6223346bf7bcf2ea82

          SHA256

          63733ff3b794ebd7566103c8a37f7de862348ffacf130661f2c544dea8cde904

          SHA512

          ee27d5912e2fb4b045ffd39689162ab2668a79615b2b641a17b6b03c4273070a711f9f29dd847ffff5ae437d9df6102df6e10e898c36d44ec25e64ba1dd83386

        • C:\Windows\Tasks\Hkbsse.job

          Filesize

          266B

          MD5

          76bb73269b3462addc8d5fabc8e6f073

          SHA1

          8b7d4a065c4533e74ae1ee4e0f977ebae61d0ff4

          SHA256

          15ade665d7dc326d7208208faa599a2269270587b6c732968a4632f3b0cc5cde

          SHA512

          56be96de68230f07f518b670cdbc013508c3478d9e0af7c55faf4394a6584535a897706ffe5c2eb4bff748f81da3c437a6559e069f829d9b7b6d57003be655ba

        • \Program Files (x86)\%tepm%\t_protected.exe

          Filesize

          3.2MB

          MD5

          3749aab78d4fe372863ce1dbc98ff9b3

          SHA1

          a73c0b080499eb21a3df34f099e26980b3c21a08

          SHA256

          cd7fce0b350f192e68e533552837e6c8c63c4a8c6c6ef45f36c1e2427b10032a

          SHA512

          7f5cd37a4fbbd060c324c60f7e10fe7f874ed497e35a5d0eb75861069cd00f68abd10a7484853f9fb48f9ceb5e67a70818be9bca9a9488cad44a7ad3771f6b64

        • \Users\Admin\AppData\Local\Temp\da_protected.exe

          Filesize

          3.2MB

          MD5

          3d21c714fbb98a6a3c72919928c9525c

          SHA1

          bf628293920b8f0418de008acc8f3506eaeff3cb

          SHA256

          811be420db2f390e60a291018126a8aa45c8c5182c050b13076c80d3f80d153c

          SHA512

          3b21fda899cf197a740dd4f2844c99c772a16ffe20581fe78e801c193f29714fbfa23843059ee34baf6176e71434f0ed7506d75de91b87348bcf9cc4b999575a

        • memory/296-668-0x00000000013D0000-0x0000000001D2C000-memory.dmp

          Filesize

          9.4MB

        • memory/296-669-0x00000000013D0000-0x0000000001D2C000-memory.dmp

          Filesize

          9.4MB

        • memory/492-477-0x0000000000C20000-0x0000000001578000-memory.dmp

          Filesize

          9.3MB

        • memory/492-88-0x0000000000C20000-0x0000000001578000-memory.dmp

          Filesize

          9.3MB

        • memory/492-230-0x0000000000C20000-0x0000000001578000-memory.dmp

          Filesize

          9.3MB

        • memory/492-229-0x0000000000C20000-0x0000000001578000-memory.dmp

          Filesize

          9.3MB

        • memory/1612-628-0x0000000003A50000-0x00000000043AC000-memory.dmp

          Filesize

          9.4MB

        • memory/1612-627-0x0000000003A50000-0x00000000043AC000-memory.dmp

          Filesize

          9.4MB

        • memory/1612-626-0x0000000003A50000-0x00000000043AC000-memory.dmp

          Filesize

          9.4MB

        • memory/1612-625-0x0000000003A50000-0x00000000043AC000-memory.dmp

          Filesize

          9.4MB

        • memory/1720-136-0x0000000000990000-0x0000000000D2C000-memory.dmp

          Filesize

          3.6MB

        • memory/1720-143-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-173-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-171-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-169-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-167-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-165-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-163-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-161-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-159-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-157-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-155-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-153-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-151-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-149-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-147-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-145-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-197-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-141-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-140-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-139-0x0000000000540000-0x000000000055C000-memory.dmp

          Filesize

          112KB

        • memory/1720-138-0x0000000004650000-0x000000000473C000-memory.dmp

          Filesize

          944KB

        • memory/1720-177-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-179-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-181-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-175-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-183-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-137-0x00000000022F0000-0x00000000023F6000-memory.dmp

          Filesize

          1.0MB

        • memory/1720-189-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-185-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-199-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-187-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-191-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-193-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/1720-195-0x0000000000540000-0x0000000000555000-memory.dmp

          Filesize

          84KB

        • memory/2128-0-0x0000000000E40000-0x00000000012F5000-memory.dmp

          Filesize

          4.7MB

        • memory/2128-1-0x0000000077260000-0x0000000077262000-memory.dmp

          Filesize

          8KB

        • memory/2128-2-0x0000000000E41000-0x0000000000E6F000-memory.dmp

          Filesize

          184KB

        • memory/2128-3-0x0000000000E40000-0x00000000012F5000-memory.dmp

          Filesize

          4.7MB

        • memory/2128-5-0x0000000000E40000-0x00000000012F5000-memory.dmp

          Filesize

          4.7MB

        • memory/2128-15-0x0000000000E40000-0x00000000012F5000-memory.dmp

          Filesize

          4.7MB

        • memory/2372-712-0x0000000000160000-0x00000000001B0000-memory.dmp

          Filesize

          320KB

        • memory/2508-35-0x0000000000800000-0x0000000000850000-memory.dmp

          Filesize

          320KB

        • memory/2564-121-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-20-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-18-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-17-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-16-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-242-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-261-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-263-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2564-275-0x0000000000BE0000-0x0000000001095000-memory.dmp

          Filesize

          4.7MB

        • memory/2812-52-0x0000000000020000-0x0000000000021000-memory.dmp

          Filesize

          4KB

        • memory/2956-84-0x0000000003E60000-0x00000000047B8000-memory.dmp

          Filesize

          9.3MB

        • memory/2956-86-0x0000000003E60000-0x00000000047B8000-memory.dmp

          Filesize

          9.3MB

        • memory/2956-476-0x0000000003E60000-0x00000000047B8000-memory.dmp

          Filesize

          9.3MB