Static task
static1
Behavioral task
behavioral1
Sample
2024-07-01_187b7af79c949188616cf8cb63ff5c6a_megazord.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-07-01_187b7af79c949188616cf8cb63ff5c6a_megazord.exe
Resource
win10v2004-20240508-en
General
-
Target
2024-07-01_187b7af79c949188616cf8cb63ff5c6a_megazord
-
Size
32.3MB
-
MD5
187b7af79c949188616cf8cb63ff5c6a
-
SHA1
1b4a295155b7a6bb6efe228c8543c68352965722
-
SHA256
f5cc8cf85e25f8ef42232c5597607836ee2f0d3b720aaf0ed840141bdc705378
-
SHA512
9e858c76bdd60c904f774a45fdf06f5fd082beff1b2d77ddcbce3714e48dfae7e62ecf7f5a13b69717688b90f83debfae80899c6f5983d59591f6dbc6555bdbc
-
SSDEEP
393216:V3fuGwz5KnWRvVQrqNY2pbMx92ArW1m3V3VSDBEjouXV1kIiDEqTmY+v+VQy+XY6:5UpbMxH
Malware Config
Signatures
-
Detects executables using Telegram Chat Bot 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_TelegramChatBot -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-07-01_187b7af79c949188616cf8cb63ff5c6a_megazord
Files
-
2024-07-01_187b7af79c949188616cf8cb63ff5c6a_megazord.exe windows:6 windows x64 arch:x64
b715fdf3ae865e52714d83057bd2c5bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
sas
SendSAS
newdev
UpdateDriverForPlugAndPlayDevicesW
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationW
WTSEnumerateSessionsA
kernel32
WaitForSingleObject
ReleaseSemaphore
lstrlenW
FormatMessageW
TryAcquireSRWLockExclusive
QueryPerformanceFrequency
FindClose
VerSetConditionMask
VerifyVersionInfoW
GetCurrentThread
RtlCaptureContext
GetLogicalDrives
SetFileTime
CreateFileW
GetConsoleMode
SetConsoleMode
GetStdHandle
GetSystemInfo
WakeAllConditionVariable
SetFilePointerEx
GetFileType
GetFileInformationByHandleEx
SleepConditionVariableSRW
UnmapViewOfFile
GetExitCodeProcess
LocalFree
PostQueuedCompletionStatus
LocalAlloc
ProcessIdToSessionId
ConnectNamedPipe
FlushFileBuffers
OpenProcess
DeviceIoControl
GetModuleHandleExA
GetCurrentThreadId
GetNativeSystemInfo
TerminateProcess
WTSGetActiveConsoleSessionId
VirtualAllocEx
WriteProcessMemory
GetModuleHandleA
QueueUserAPC
ResumeThread
SetThreadExecutionState
CopyFileExW
GlobalLock
GlobalSize
GlobalUnlock
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetUserPreferredUILanguages
GetModuleHandleW
CreateSemaphoreA
SetConsoleCtrlHandler
GlobalMemoryStatusEx
K32GetPerformanceInfo
SetHandleInformation
GetQueuedCompletionStatusEx
SetLastError
GetFinalPathNameByHandleW
ReadFile
GetOverlappedResult
WriteFile
CancelIoEx
CreateIoCompletionPort
SetFileCompletionNotificationModes
LoadLibraryW
GetLogicalProcessorInformation
CreateNamedPipeW
WakeConditionVariable
FreeLibrary
LoadLibraryExA
CreateFileMappingW
OpenFileMappingW
MapViewOfFile
WriteConsoleW
GetCurrentDirectoryW
GetEnvironmentVariableW
SetEnvironmentVariableW
GetTempPathW
SetWaitableTimer
GetCommandLineW
SetFileInformationByHandle
GetFileInformationByHandle
GetFullPathNameW
FindNextFileW
CreateDirectoryW
FindFirstFileW
ReadFileEx
SleepEx
GetEnvironmentStringsW
FreeEnvironmentStringsW
CompareStringOrdinal
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
DeleteProcThreadAttributeList
CreateThread
WriteFileEx
WaitForMultipleObjects
CreateEventW
CancelIo
ExitProcess
GetSystemTimeAsFileTime
GetProcessHeap
HeapAlloc
RtlVirtualUnwind
DeleteFileW
MoveFileExW
RemoveDirectoryW
CreateSymbolicLinkW
GetTickCount64
GetProcessTimes
ReadProcessMemory
VirtualQueryEx
GetSystemTimes
GetProcessIoCounters
SetErrorMode
SetThreadErrorMode
GetComputerNameExW
VirtualQuery
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetFileSize
GetFileTime
SetFilePointer
ResetEvent
InitializeCriticalSectionEx
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InitializeConditionVariable
InitOnceBeginInitialize
InitOnceComplete
SleepConditionVariableCS
SetThreadPriority
CreateSemaphoreW
TryEnterCriticalSection
InitializeCriticalSection
SetUnhandledExceptionFilter
FindFirstFileExW
OutputDebugStringW
ReadConsoleW
GetFileSizeEx
GetConsoleCP
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetCommandLineA
Sleep
CreateWaitableTimerExW
WaitForMultipleObjectsEx
QueryPerformanceCounter
SetEvent
SwitchToThread
CreateEventA
ReleaseSRWLockExclusive
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
TzSpecificLocalTimeToSystemTime
RtlLookupFunctionEntry
ReleaseMutex
GetCurrentProcess
GetProcAddress
CreateMutexA
GetCurrentProcessId
LoadLibraryA
WaitForSingleObjectEx
AcquireSRWLockExclusive
HeapReAlloc
GetLastError
SetThreadStackGuarantee
AddVectoredExceptionHandler
ReleaseSRWLockShared
AcquireSRWLockShared
HeapFree
CloseHandle
IsValidCodePage
GetACP
GetOEMCP
SetStdHandle
HeapSize
SetEndOfFile
GetModuleFileNameW
RtlUnwind
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
LoadLibraryExW
RaiseException
RtlPcToFileHeader
RtlUnwindEx
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
DecodePointer
EncodePointer
GetStringTypeW
WideCharToMultiByte
GetStartupInfoW
IsDebuggerPresent
InitializeSListHead
IsProcessorFeaturePresent
UnhandledExceptionFilter
secur32
AcquireCredentialsHandleA
DecryptMessage
QueryContextAttributesW
DeleteSecurityContext
FreeCredentialsHandle
InitializeSecurityContextW
FreeContextBuffer
AcceptSecurityContext
EncryptMessage
ApplyControlToken
advapi32
CreateProcessWithTokenW
ImpersonateLoggedOnUser
DuplicateTokenEx
RegDeleteKeyW
QueryServiceStatusEx
OpenServiceW
OpenSCManagerW
CloseServiceHandle
LookupAccountSidW
EqualSid
RegEnumValueW
AdjustTokenPrivileges
LookupPrivilegeValueW
CopySid
GetLengthSid
IsValidSid
CreateProcessWithLogonW
CreateProcessAsUserW
RegEnumKeyExW
RegSetValueExW
GetTokenInformation
OpenProcessToken
RegDeleteTreeW
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetSecurityDescriptorDacl
FreeSid
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetServiceStatus
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
SystemFunction036
api-ms-win-shcore-scaling-l1-1-1
SetProcessDpiAwareness
ole32
OleSetClipboard
OleGetClipboard
CoTaskMemFree
OleIsCurrentClipboard
CoInitializeEx
OleInitialize
PropVariantClear
OleUninitialize
CoTaskMemAlloc
CoUninitialize
ReleaseStgMedium
CoCreateInstance
user32
GetClientRect
MapWindowPoints
OffsetRect
GetWindowDC
MessageBoxW
AppendMenuW
CreateAcceleratorTableW
DrawIconEx
SetMenuItemInfoW
ClientToScreen
SetForegroundWindow
TrackPopupMenu
MonitorFromWindow
IsProcessDPIAware
DestroyAcceleratorTable
PostQuitMessage
AttachThreadInput
GetKeyboardState
ToUnicodeEx
CheckMenuItem
MsgWaitForMultipleObjectsEx
DestroyMenu
RemoveMenu
DrawMenuBar
SetMenu
SendMessageW
SetWindowPos
AdjustWindowRectEx
GetMenu
GetWindowLongW
SetWindowTextW
ShowWindow
GetMessageW
InvalidateRgn
DestroyIcon
GetUpdateRect
MapVirtualKeyW
PostThreadMessageW
PostMessageW
PeekMessageW
ValidateRect
GetRawInputData
ExitWindowsEx
RegisterWindowMessageA
RegisterClassExW
DefWindowProcW
TranslateMessage
DispatchMessageW
OpenClipboard
RedrawWindow
DestroyWindow
RegisterClassW
CreatePopupMenu
CreateMenu
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetThreadDesktop
GetUserObjectInformationA
PeekMessageA
SendMessageA
PostMessageA
GetAsyncKeyState
RegisterRawInputDevices
CreateIcon
SystemParametersInfoA
wsprintfW
GetClipboardOwner
SetClipboardViewer
ChangeClipboardChain
RegisterClipboardFormatA
RegisterClipboardFormatW
CountClipboardFormats
GetClipboardFormatNameA
SetWindowLongPtrW
CreateWindowExW
SetClipboardData
EmptyClipboard
CloseClipboard
GetClipboardData
IsClipboardFormatAvailable
ReleaseDC
GetDC
GetIconInfo
GetMenuBarInfo
GetWindowRect
FindWindowA
CallNextHookEx
UnhookWindowsHookEx
DispatchMessageA
GetMessageA
SetWindowsHookExA
EnumDisplaySettingsExW
PostThreadMessageA
EnumDisplayDevicesW
FindWindowExA
CreateWindowExA
RegisterClassExA
LoadCursorA
DefWindowProcA
ChangeDisplaySettingsExW
SystemParametersInfoW
EnumDisplaySettingsW
GetCursorInfo
LockWorkStation
GetSystemMetrics
GetCursorPos
BlockInput
GetKeyState
VkKeyScanExW
MapVirtualKeyExW
GetKeyboardLayout
GetWindowThreadProcessId
GetForegroundWindow
SendInput
GetMenuItemInfoW
iphlpapi
GetAdaptersAddresses
SendARP
shell32
CommandLineToArgvW
Shell_NotifyIconGetRect
SHGetKnownFolderPath
SHAddToRecentDocs
ShellExecuteW
Shell_NotifyIconW
ShellExecuteA
ShellExecuteExW
pdh
PdhGetFormattedCounterValue
PdhRemoveCounter
PdhCloseQuery
PdhAddEnglishCounterW
PdhCollectQueryData
PdhAddEnglishCounterA
PdhCollectQueryDataEx
PdhOpenQueryA
ws2_32
getpeername
recvfrom
getsockname
WSACleanup
WSAStartup
freeaddrinfo
getaddrinfo
send
WSASend
setsockopt
recv
WSAIoctl
socket
sendto
accept
listen
getsockopt
shutdown
WSAGetLastError
connect
WSASocketW
closesocket
bind
ioctlsocket
bcrypt
BCryptGenRandom
gdi32
CreateCompatibleBitmap
DeleteObject
GetDeviceCaps
CreateDCW
DeleteDC
BitBlt
CreateDIBSection
GetObjectA
GetBitmapBits
GetDIBits
CreateCompatibleDC
SelectObject
setupapi
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailW
SetupDiDestroyDeviceInfoList
SetupDiSetClassInstallParamsW
SetupDiGetClassDevsExW
SetupDiGetDeviceInfoListDetailW
SetupDiEnumDeviceInfo
SetupDiCallClassInstaller
SetupDiSetDeviceRegistryPropertyW
SetupDiCreateDeviceInfoW
SetupDiCreateDeviceInfoList
SetupDiGetINFClassW
SetupDiGetClassDevsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstallParamsW
crypt32
CertEnumCertificatesInStore
CertVerifyCertificateChainPolicy
CertFreeCertificateChain
CertDuplicateCertificateContext
CertAddCertificateContextToStore
CertDuplicateCertificateChain
CertOpenStore
CertCloseStore
CertDuplicateStore
CertFreeCertificateContext
CertGetCertificateChain
cfgmgr32
CM_Get_DevNode_Status
comctl32
SetWindowSubclass
DefSubclassProc
RemoveWindowSubclass
ntdll
RtlNtStatusToDosError
NtWriteFile
RtlGetNtVersionNumbers
NtQueryInformationProcess
NtReadFile
NtQuerySystemInformation
NtCancelIoFileEx
NtDeviceIoControlFile
RtlGetVersion
NtCreateFile
uxtheme
DrawThemeBackground
OpenThemeData
DrawThemeText
CloseThemeData
d3d11
D3D11CreateDevice
dxgi
CreateDXGIFactory1
psapi
GetModuleFileNameExW
GetProcessMemoryInfo
powrprof
CallNtPowerInformation
oleaut32
SysStringLen
GetErrorInfo
SysFreeString
userenv
DestroyEnvironmentBlock
CreateEnvironmentBlock
Sections
.text Size: 15.0MB - Virtual size: 15.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rodata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16.6MB - Virtual size: 16.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 377KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 288KB - Virtual size: 287KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ