Overview
overview
10Static
static
10pluto/file...oS.exe
windows7-x64
1pluto/file...oS.exe
windows10-2004-x64
1pluto/file...V2.exe
windows7-x64
1pluto/file...V2.exe
windows10-2004-x64
1pluto/file...IT.bat
windows7-x64
1pluto/file...IT.bat
windows10-2004-x64
1pluto/file...er.bat
windows7-x64
1pluto/file...er.bat
windows10-2004-x64
1pluto/file...er.exe
windows7-x64
1pluto/file...er.exe
windows10-2004-x64
1pluto/file...in.bat
windows7-x64
1pluto/file...in.bat
windows10-2004-x64
1pluto/file...ol.exe
windows7-x64
7pluto/file...ol.exe
windows10-2004-x64
7pluto/file...of.exe
windows7-x64
1pluto/file...of.exe
windows10-2004-x64
1pluto/file...rk.exe
windows7-x64
7pluto/file...rk.exe
windows10-2004-x64
9pluto/file...r3.exe
windows7-x64
7pluto/file...r3.exe
windows10-2004-x64
7pluto/files/info.bat
windows7-x64
1pluto/files/info.bat
windows10-2004-x64
1pluto/file...up.exe
windows7-x64
7pluto/file...up.exe
windows10-2004-x64
7pluto/files/pScan.exe
windows7-x64
1pluto/files/pScan.exe
windows10-2004-x64
1pluto/file...ec.bat
windows7-x64
1pluto/file...ec.bat
windows10-2004-x64
1pluto/files/putty.exe
windows7-x64
1pluto/files/putty.exe
windows10-2004-x64
1pluto/file...mp.exe
windows7-x64
1pluto/file...mp.exe
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 08:48
Behavioral task
behavioral1
Sample
pluto/files/AnDDoS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
pluto/files/AnDDoS.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win7-20240419-en
Behavioral task
behavioral4
Sample
pluto/files/Dox_Tool_V2.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
pluto/files/IPTOOLKIT.bat
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
pluto/files/IPTOOLKIT.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
pluto/files/Pinger.bat
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
pluto/files/Pinger.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
pluto/files/PortScanner.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
pluto/files/PortScanner.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
pluto/files/SMB-Bruteforce-main.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
pluto/files/Wifi-Multitool.exe
Resource
win7-20240611-en
Behavioral task
behavioral14
Sample
pluto/files/Wifi-Multitool.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
pluto/files/arpspoof.exe
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
pluto/files/arpspoof.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral17
Sample
pluto/files/doxing-framework.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
pluto/files/doxing-framework.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
pluto/files/emailbomber3.exe
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
pluto/files/emailbomber3.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral21
Sample
pluto/files/info.bat
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
pluto/files/info.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral23
Sample
pluto/files/iplookup.exe
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
pluto/files/iplookup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral25
Sample
pluto/files/pScan.exe
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
pluto/files/pScan.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
pluto/files/psexec.bat
Resource
win7-20240611-en
Behavioral task
behavioral28
Sample
pluto/files/psexec.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
pluto/files/putty.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
pluto/files/putty.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
pluto/files/rpcdump.exe
Resource
win7-20240611-en
Behavioral task
behavioral32
Sample
pluto/files/rpcdump.exe
Resource
win10v2004-20240611-en
General
-
Target
pluto/files/info.bat
-
Size
1008B
-
MD5
e85f0ba77dcf1c969645d2332c4acf91
-
SHA1
2950ca197922f4ba113234c64d70a219895386e6
-
SHA256
68196f1acf2cd2ee6015d79e6fc66a8ef2d878527fd7d9cef290c2a011b4c6ec
-
SHA512
01ac8bc0aa4e7c4565ef18ce80ce8887d5c22a9e3c3cd88dbbf9f3335d1b0793aa5ff5b86ec781663c4c5bf63a509ac7ac331ec3cf079d4bbcfc353ab4d1b619
Malware Config
Signatures
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2564 systeminfo.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4816 wrote to memory of 2564 4816 cmd.exe 85 PID 4816 wrote to memory of 2564 4816 cmd.exe 85 PID 4816 wrote to memory of 1048 4816 cmd.exe 91 PID 4816 wrote to memory of 1048 4816 cmd.exe 91 PID 1048 wrote to memory of 3960 1048 cmd.exe 92 PID 1048 wrote to memory of 3960 1048 cmd.exe 92 PID 1048 wrote to memory of 1940 1048 cmd.exe 93 PID 1048 wrote to memory of 1940 1048 cmd.exe 93 PID 4816 wrote to memory of 3356 4816 cmd.exe 94 PID 4816 wrote to memory of 3356 4816 cmd.exe 94 PID 3356 wrote to memory of 3412 3356 cmd.exe 95 PID 3356 wrote to memory of 3412 3356 cmd.exe 95 PID 3356 wrote to memory of 4040 3356 cmd.exe 96 PID 3356 wrote to memory of 4040 3356 cmd.exe 96 PID 4816 wrote to memory of 4952 4816 cmd.exe 97 PID 4816 wrote to memory of 4952 4816 cmd.exe 97 PID 4952 wrote to memory of 5072 4952 cmd.exe 98 PID 4952 wrote to memory of 5072 4952 cmd.exe 98 PID 4952 wrote to memory of 3120 4952 cmd.exe 99 PID 4952 wrote to memory of 3120 4952 cmd.exe 99 PID 4816 wrote to memory of 4076 4816 cmd.exe 100 PID 4816 wrote to memory of 4076 4816 cmd.exe 100 PID 4076 wrote to memory of 1508 4076 cmd.exe 101 PID 4076 wrote to memory of 1508 4076 cmd.exe 101 PID 4076 wrote to memory of 432 4076 cmd.exe 102 PID 4076 wrote to memory of 432 4076 cmd.exe 102
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pluto\files\info.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Registered Owner"2⤵
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:3960
-
-
C:\Windows\system32\find.exefind "Registered Owner"3⤵PID:1940
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "OS Name"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:3412
-
-
C:\Windows\system32\find.exefind "OS Name"3⤵PID:4040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "System Manufacturer"2⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:5072
-
-
C:\Windows\system32\find.exefind "System Manufacturer"3⤵PID:3120
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Product ID"2⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "3⤵PID:1508
-
-
C:\Windows\system32\find.exefind "Product ID"3⤵PID:432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56c1e6d1e1ed8552936324e6e4dc02607
SHA1ddb39c10b7c5fd143828bdde5d1f554977b22531
SHA2564ce0701fb20dac168eeb9fa5a0f9479f4e7b57150da81a643963454f6cf8e6ec
SHA51262280677d257c4091d75554a5f17a9bcc16dab90c8c1f8533704a40b8b529f628878f605b87ee84442c1cff7655094dc218707923ca14a65f79cda17e9708ded