General

  • Target

    TROLLLOLL-main.zip

  • Size

    78.7MB

  • Sample

    240708-nkrh7syfrf

  • MD5

    71e713dd3adb5162493877d698767493

  • SHA1

    75c04f6ad957c7a5057963339476408ea8e507db

  • SHA256

    6b55434b24ebda6659479358d5d66ae7ee02552656234a36fcd2a7c7c4b852c9

  • SHA512

    2b67cbea20eca6714390c4cd34a2452a726b41eacda0cc9729224cbc6ec6169fdda2c6857be386f620ffb1bf50e3f31e21f26eda2ef5fa2e8e8996590a5c7b4e

  • SSDEEP

    1572864:viu5xhyD0sNAD5YIE7HhN9n0NeTBXbt6hID3dYdjacB2RVgZ06Kmj7uqi0e:vnV4ANYIk3x3lXJ6o+d2c8b+0dmPje

Malware Config

Extracted

Family

stealerium

C2

https://discord.com/api/webhooks/1229897378534785024/w913pfbmcplo1dycWrPCWhWLxOF9dTH_FifkgM7MDcaPqzxlJtqs63z7GsIqXUNRUY1Z

Extracted

Family

quasar

Version

1.4.1

Botnet

Test

C2

47.134.26.200:4782

193.161.193.99:23325

Mutex

9cabbafb-503b-49f1-ab22-adc756455c10

Attributes
  • encryption_key

    8B93C77AC1C58EA80A3327E9FD26246A79EF3B8E

  • install_name

    Client.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    MS Build Tools

  • subdirectory

    Microsoft-Build-Tools

Extracted

Family

skuld

C2

https://discord.com/api/webhooks/1241946879428792391/E4kLuT4H7xIgf8x5LgPsoaZ6xw6Se0ShMgu1D6zvkZ4oHp-vBo21j2Pn6QWrNlMwFzCF

Targets

    • Target

      TROLLLOLL-main.zip

    • Size

      78.7MB

    • MD5

      71e713dd3adb5162493877d698767493

    • SHA1

      75c04f6ad957c7a5057963339476408ea8e507db

    • SHA256

      6b55434b24ebda6659479358d5d66ae7ee02552656234a36fcd2a7c7c4b852c9

    • SHA512

      2b67cbea20eca6714390c4cd34a2452a726b41eacda0cc9729224cbc6ec6169fdda2c6857be386f620ffb1bf50e3f31e21f26eda2ef5fa2e8e8996590a5c7b4e

    • SSDEEP

      1572864:viu5xhyD0sNAD5YIE7HhN9n0NeTBXbt6hID3dYdjacB2RVgZ06Kmj7uqi0e:vnV4ANYIk3x3lXJ6o+d2c8b+0dmPje

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks