General
-
Target
TROLLLOLL-main.zip
-
Size
78.7MB
-
Sample
240708-nkrh7syfrf
-
MD5
71e713dd3adb5162493877d698767493
-
SHA1
75c04f6ad957c7a5057963339476408ea8e507db
-
SHA256
6b55434b24ebda6659479358d5d66ae7ee02552656234a36fcd2a7c7c4b852c9
-
SHA512
2b67cbea20eca6714390c4cd34a2452a726b41eacda0cc9729224cbc6ec6169fdda2c6857be386f620ffb1bf50e3f31e21f26eda2ef5fa2e8e8996590a5c7b4e
-
SSDEEP
1572864:viu5xhyD0sNAD5YIE7HhN9n0NeTBXbt6hID3dYdjacB2RVgZ06Kmj7uqi0e:vnV4ANYIk3x3lXJ6o+d2c8b+0dmPje
Behavioral task
behavioral1
Sample
TROLLLOLL-main.zip
Resource
win10v2004-20240704-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1229897378534785024/w913pfbmcplo1dycWrPCWhWLxOF9dTH_FifkgM7MDcaPqzxlJtqs63z7GsIqXUNRUY1Z
Extracted
quasar
1.4.1
Test
47.134.26.200:4782
193.161.193.99:23325
9cabbafb-503b-49f1-ab22-adc756455c10
-
encryption_key
8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E
-
install_name
Client.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
MS Build Tools
-
subdirectory
Microsoft-Build-Tools
Extracted
skuld
https://discord.com/api/webhooks/1241946879428792391/E4kLuT4H7xIgf8x5LgPsoaZ6xw6Se0ShMgu1D6zvkZ4oHp-vBo21j2Pn6QWrNlMwFzCF
Targets
-
-
Target
TROLLLOLL-main.zip
-
Size
78.7MB
-
MD5
71e713dd3adb5162493877d698767493
-
SHA1
75c04f6ad957c7a5057963339476408ea8e507db
-
SHA256
6b55434b24ebda6659479358d5d66ae7ee02552656234a36fcd2a7c7c4b852c9
-
SHA512
2b67cbea20eca6714390c4cd34a2452a726b41eacda0cc9729224cbc6ec6169fdda2c6857be386f620ffb1bf50e3f31e21f26eda2ef5fa2e8e8996590a5c7b4e
-
SSDEEP
1572864:viu5xhyD0sNAD5YIE7HhN9n0NeTBXbt6hID3dYdjacB2RVgZ06Kmj7uqi0e:vnV4ANYIk3x3lXJ6o+d2c8b+0dmPje
Score1/10 -