Analysis

  • max time kernel
    135s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 07:53

General

  • Target

    ANDROID RAT/Compiler.exe

  • Size

    8.1MB

  • MD5

    de516eb29dbf7dfc4fad6ece9b0006d2

  • SHA1

    ab14d37b175dbc956c057c6f82040661740270f5

  • SHA256

    3cd0aa003daac31a45fc62b54024afe108bfad2288667e9b8a1ce3530ee1b489

  • SHA512

    60996d7f729bef43825e72ba9b2c53c1d681cf0e4ca58a009075d656addb4a9151ff46b1671cd12e8e7703c15557fe32083be8b392c9797e4b7930bbdf196ddd

  • SSDEEP

    196608:K+0MhCeBTX1QFhjwt25HnuOpPOf+NIqAkL:jlAOOHuOOWuq

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 37 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ANDROID RAT\Compiler.exe
    "C:\Users\Admin\AppData\Local\Temp\ANDROID RAT\Compiler.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Users\Admin\AppData\Local\Temp\ANDROID RAT\Compiler.exe
      "C:\Users\Admin\AppData\Local\Temp\ANDROID RAT\Compiler.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "tasklist"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2292
        • C:\Windows\system32\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_Salsa20.pyd

    Filesize

    13KB

    MD5

    e598d24941e68620aef43723b239e1c5

    SHA1

    fa3c711aa55a700e2d5421f5f73a50662a9cc443

    SHA256

    e63d4123d894b61e0242d53813307fa1ff3b7b60818827520f7ff20cabcd8904

    SHA512

    904e04fb28cffa2890c0cb4f1169a7cc830224740f0df3da622ac2eb9b8f8bdbb4de88836e40a0126be0eb3e5131a8d8b5aaacd782d1c5875a2fbbc939f78d5b

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_raw_cbc.pyd

    Filesize

    12KB

    MD5

    ff2c1c4a7ae46c12eb3963f508dad30f

    SHA1

    4d759c143f78a4fe1576238587230acdf68d9c8c

    SHA256

    73cf4155df136db24c2240e8db0c76bedcbb721e910558512d6008adaf7eed50

    SHA512

    453ef9eed028ae172d4b76b25279ad56f59291be19eb918de40db703ec31cddf60dce2e40003dfd1ea20ec37e03df9ef049f0a004486cc23db8c5a6b6a860e7b

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_raw_cfb.pyd

    Filesize

    13KB

    MD5

    fe489576d8950611c13e6cd1d682bc3d

    SHA1

    2411d99230ef47d9e2e10e97bdea9c08a74f19af

    SHA256

    bb79a502eca26d3418b49a47050fb4015fdb24bee97ce56cdd070d0fceb96ccd

    SHA512

    0f605a1331624d3e99cfdc04b60948308e834aa784c5b7169986eefbce4791faa148325c1f1a09624c1a1340e0e8cf82647780ffe7b3e201fdc2b60bcfd05e09

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_raw_ctr.pyd

    Filesize

    14KB

    MD5

    a33ac93007ab673cb2780074d30f03bd

    SHA1

    b79fcf833634e6802a92359d38fbdcf6d49d42b0

    SHA256

    4452cf380a07919b87f39bc60768bcc4187b6910b24869dbd066f2149e04de47

    SHA512

    5d8bdca2432cdc5a76a3115af938cc76cf1f376b070a7fd1bcbf58a7848d4f56604c5c14036012027c33cc45f71d5430b5abbfbb2d4adaf5c115ddbd1603ab86

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_raw_ecb.pyd

    Filesize

    10KB

    MD5

    821aaa9a74b4ccb1f75bd38b13b76566

    SHA1

    907c8ee16f3a0c6e44df120460a7c675eb36f1dd

    SHA256

    614b4f9a02d0191c3994205ac2c58571c0af9b71853be47fcf3cb3f9bc1d7f54

    SHA512

    9d2ef8f1a2d3a7374ff0cdb38d4a93b06d1db4219bae06d57a075ee3dff5f7d6f890084dd51a972ac7572008f73fde7f5152ce5844d1a19569e5a9a439c4532b

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Cipher\_raw_ofb.pyd

    Filesize

    12KB

    MD5

    619fb21dbeaf66bf7d1b61f6eb94b8c5

    SHA1

    7dd87080b4ed0cba070bb039d1bdeb0a07769047

    SHA256

    a2afe994f8f2e847951e40485299e88718235fbefb17fccca7ace54cc6444c46

    SHA512

    ee3dbd00d6529fcfcd623227973ea248ac93f9095430b9dc4e3257b6dc002b614d7ce4f3daab3e02ef675502afdbe28862c14e30632e3c715c434440615c4dd4

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Hash\_BLAKE2s.pyd

    Filesize

    14KB

    MD5

    cea18eb87e54403af3f92f8d6dbdd6e8

    SHA1

    f1901a397edd9c4901801e8533c5350c7a3a8513

    SHA256

    7fe364add28266c8211457896d2517fdb0ee9efc8cb65e716847965b3e9d789f

    SHA512

    74a3c94d8c4070b66258a5b847d9ced705f81673dd12316604e392c9d21ae6890e3720ca810b38e140650397c6ff05fd2fa0ff2d136fc5579570520ffdc1dbac

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Hash\_MD5.pyd

    Filesize

    15KB

    MD5

    9adc256c4384ee1fe8c0ad5c5e44cd95

    SHA1

    c5fc6e7ae0dfa5cf87833b23cd0294e9ae1f5bca

    SHA256

    77ee1e140414615113eabb5fc43dbba69daee5951b7e27e387ca295b0c5f651d

    SHA512

    4cb0905f0196b34aa66ac6ff191bd4705146a3e00dcd8b3f674740d29404c22b61f3c75b6ffb1fd5fdb044320c89a2f3ef224f1f1aa35342ff3dc5f701642b76

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Hash\_SHA1.pyd

    Filesize

    17KB

    MD5

    5e6fef0ff0c688db13ed2777849e8e87

    SHA1

    3e739107b1b5ff8f1ffaac2ede75b71d4ebd128f

    SHA256

    e88a0347f9969991756815dff0af940f00e966bc7875aa4763a2c80516f7e4ed

    SHA512

    b97d4aa0ae76f528e643180ed300f1a50eafe8b82c27212a95ce380bca85f9ce1ff1ac1190173d56776fd663f649817514d6501ce80518f526159398daa6f55c

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Hash\_SHA256.pyd

    Filesize

    21KB

    MD5

    6abdcd64face45efb50a3f2d6d792b93

    SHA1

    038dbd53932c4a539c69db54707b56e4779f0eef

    SHA256

    1031ea4c1fd2f673089052986629b6f554e5b34582b2f38e134fd64876d9ce0f

    SHA512

    6ebe3572938734d0fa9e4ec5abdb7f63d17f28ba7e94f1fe40926be93668d1a542ffc963f9a49c5f020720caad0852579fed6c9c6d0ab71b682e27245adc916c

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Protocol\_scrypt.pyd

    Filesize

    12KB

    MD5

    acd58f05ef429d4d85163b98b26a2307

    SHA1

    ccdf4a294b2e05b5e16784bae562bfdb474308a0

    SHA256

    bb2be221531d66ec5e6ef026f5548749430a785fd1fa1c1becb12375c0ca6d1d

    SHA512

    4cc272b161a7ea35e45274d2fb1358104f9bed5a7b460f1dc094c48ad834d94d779e73362c4e4ca3f3b7feae4da9812b5cd5f5edf7683668043a7c62b853a0d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Util\_cpuid_c.pyd

    Filesize

    10KB

    MD5

    1831cb26fd8ee2b0ab0496f80272fc04

    SHA1

    bc8e78cc005859f7272c3615a3774ba7d687f0f4

    SHA256

    d830d77669527129bf3d10929aad1cc9ee5e44a9594e3fc651d3b5bc01c42c44

    SHA512

    df51d636a277c8ad83c90ae99a824f77c441da5c7b08a11c3d8752cd3661096ebf327008951ca97b4baf9632b2ca16df34a9f3e43bf837c8556bcb3c304bb2cc

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\Crypto\Util\_strxor.pyd

    Filesize

    10KB

    MD5

    3af448b8a7ef86d459d86f88a983eaec

    SHA1

    d852be273fea71d955ea6b6ed7e73fc192fb5491

    SHA256

    bf3a209eda07338762b8b58c74965e75f1f0c03d3f389b0103cc2bf13acfe69a

    SHA512

    be8c0a9b1f14d73e1adf50368293eff04ad34bda71dbf0b776ffd45b6ba58a2fa66089bb23728a5077ab630e68bf4d08af2712c1d3fb7d79733eb06f2d0f6dbf

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\VCRUNTIME140.dll

    Filesize

    91KB

    MD5

    7942be5474a095f673582997ae3054f1

    SHA1

    e982f6ebc74d31153ba9738741a7eec03a9fa5e8

    SHA256

    8ee6b49830436ff3bec9ba89213395427b5535813930489f118721fd3d2d942c

    SHA512

    49fbc9d441362b65a8d78b73d4fdcf988f22d38a35a36a233fcd54e99e95e29b804be7eabe2b174188c7860ebb34f701e13ed216f954886a285bed7127619039

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_bz2.pyd

    Filesize

    84KB

    MD5

    5a8b3602b3560868bd819b10c6343874

    SHA1

    73a5ce4d07479894f24b776eb387abd33deb83a9

    SHA256

    00d2f34aee55b473bcc11838469b94a62d01fdf4465e19f7d7388c79132f019e

    SHA512

    2f2f8305fd8853c479b5d2a442110efc3ad41a3c482cd554ebcc405fcf097e230f5cd45dbfb44050b5bd6fae662ce7cac0583c9784050f0c7d09a678768587db

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_ctypes.pyd

    Filesize

    124KB

    MD5

    e1ef9f5c77b01c82cf72522ec96b2a11

    SHA1

    e83daa56a104f6ea6235822c644b6554c3958cfe

    SHA256

    a79cf8259890d5843cf8eaf29db8dbd4bfabed50f4d859756f93ac2b30617023

    SHA512

    4231ec5b06effae6497bf62853b79420529cabaee6b58f519c3c30bdd42c925e85979c29c2db0747dcff3f99f3b19dc02ece96347e08cf49eb0abb1e19238c01

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_hashlib.pyd

    Filesize

    64KB

    MD5

    8f7edaff246c46dbf09ab5554b918b37

    SHA1

    c14c33b14419f5d24fb36e5f1bf1760a9c63228b

    SHA256

    9154b36c178d84a901edad689a53148451ef3c851a91447a0654f528a620d944

    SHA512

    1947a1010fa1b07671aa471d5821792dee7f2b0cd1937d3f944cd0201a299e6cb37a41debbbd1bc6e774186f6d08ad6264055cba7652b0d5bd22691431cb360e

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_lzma.pyd

    Filesize

    159KB

    MD5

    caa58290ab4414e2e22cc0b6ff4b2d29

    SHA1

    840902aaf7db40da17018776e5c842014c3a81ac

    SHA256

    185d407bcca7399c458133f2ce1efa938352b8093b2de040c91c3c3088ab173f

    SHA512

    a82e380ab1676424e52a36c08eabd572375dd36a7fe2b9df51d48c368aed6c04b0b3674bc6a9787efedd0ed70bb1869ed1a2f3a1f4238485710092b9cbadd00e

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_queue.pyd

    Filesize

    28KB

    MD5

    671a9ac9b34f07ada65bf1635e4626c5

    SHA1

    d4a6e478caaacdbdb52f57d12e16ba96671d30f2

    SHA256

    3f1fc09b3f0a5c8c7aff4223d002952ab26f462aa390940a9f00454815204739

    SHA512

    92617258ef747f93ab2c378f5c9a2aac14668d834df15939c1ef83a555490b9ee3380d7341bee60c33057482736a595593749b8794ddeaa9649339363095108c

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_socket.pyd

    Filesize

    78KB

    MD5

    e71c0c49f7e2bd39cafeed1dca29455b

    SHA1

    22cb314298c6c38e3246f73dc7277ed00d6b8449

    SHA256

    3b0ea76a2b0caabf5b8994d3789778575ecbf2831acaf4d53d274e265d271622

    SHA512

    4c09599c7c93427b30a011cc39738983c79f0835292e5c0e7e19f6329f33810773d0e97e20f4698d22b6d0b8b643521bc3ce318c890366872ed26b6d3dab5c05

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_sqlite3.pyd

    Filesize

    87KB

    MD5

    7be772b2cc298751e229ca9f1cd1ebb0

    SHA1

    3fc23d5d58e1357f1279b31877fc5cae19d25acd

    SHA256

    bb77ea00930a9926816e2313deff136d4f8f1827a0794b9c0088fa2474b84680

    SHA512

    5e22f7c13d59fc3ce427911401970385de50c9e3ff9dfb931c3d99c1ec5a513dd9ef5edb14069a41f2711d10246c81313927a514732d3e25b26271893ec71d17

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_ssl.pyd

    Filesize

    150KB

    MD5

    39919e97dc418e0099b2a0bb332a8c77

    SHA1

    f04c9d78b3d5e2a95ea3535c363d8b05d666d39e

    SHA256

    b38b09bf0421b1f49338ded8021d7bc56be19902d9b21a9b6e9c8df448f93eb2

    SHA512

    f179ebe84ae065ed63e71f2855b2b69cdedfc8be70dace0eb07c8b191768eace1312562e27e77492481f214f85d31f35c88c2b1f7a3881cee9dffffa7ffc668a

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\_uuid.pyd

    Filesize

    22KB

    MD5

    0803ad237eb9e6370d71d0c500ce6493

    SHA1

    60479ffe844717a7ccd451ae1cfa5208ed003177

    SHA256

    fc5dc4af3a540c97d33cd300558488884417912629fad2e36baeba6ffca9faac

    SHA512

    1f8a19fe1c228a5f7cde873a89d3c64e9b3c9b2d9b360bd893b86ac8558bae76a5f08b6a6ba093ff369f0f04e72ec10260d1d2299b796b2c1433ae11ae8b6e1a

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\base_library.zip

    Filesize

    1011KB

    MD5

    2ae40d043a0890c8b0d8b97b85695432

    SHA1

    06e3af86c62dcf1f50180be15ddc24eaf3bbb0b7

    SHA256

    0285fd0b9ba6f20e8692d1c3626e3b2809f5902531df01bf20a22ed3dc6fbcf0

    SHA512

    2323fa6a74d8ffcaa86bd783a4f6f18e98032fce4faa232f160d9984c4611e825ccf1501a323b4c3b35cba9e9b17f92e4e1d76b19a655eb5fbac442c1fedccf1

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\charset_normalizer\md.cp39-win_amd64.pyd

    Filesize

    10KB

    MD5

    c4de5638d7cf59a01c768448c6bef89d

    SHA1

    4405bae0d6fc5502e32689d99e74abafd87f9588

    SHA256

    cd8f4e8f69c855042a8f36f68a1601d96f09568baff51f96decda4fa5aeb274d

    SHA512

    adbf18508988af7c081539110d1b2b2f3acdea0e63bd039ec94fc57b53464761abae1639ad21f6302465ddf8fed3b0f987d9300d457be2706f10b2a36d58bce9

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\charset_normalizer\md__mypyc.cp39-win_amd64.pyd

    Filesize

    111KB

    MD5

    d67200e140f7226beda03e3fac5dbfce

    SHA1

    d09d0d558ca640d380ec463ef0c6acaaf800f12c

    SHA256

    ae2bdf86ce87b46bd557f7955ae4d018155e9bead7ccb63c65f359ae79fc5309

    SHA512

    d8fb745b85db89978b4abfa1ebd645bf837ed9bdec80ab647f31de0fc0a547112a893e3f76912445a367d289e57a080da25797ef8ead7cd18e1b3f6e4aaf8350

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\libcrypto-1_1.dll

    Filesize

    3.2MB

    MD5

    aa811bb63dbd4c5859b68332326f60b1

    SHA1

    6e5584d5c59d2f79cbf60c6c71a92ecd7e4e0977

    SHA256

    00a1eeb37372d11559bf44c9e68af9c841c41c95a173f3dfec4e0b5923d0cae0

    SHA512

    dad9b14f501fd63824480f8801acd4004dd46f7a6965ac8ab91e573676236a11099f4b7cfdf7b3f6c0cc52a3b2e5d9b50f715f53a1f4f858ea2a5eb15d5092cd

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\libffi-7.dll

    Filesize

    32KB

    MD5

    eef7981412be8ea459064d3090f4b3aa

    SHA1

    c60da4830ce27afc234b3c3014c583f7f0a5a925

    SHA256

    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

    SHA512

    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\libssl-1_1.dll

    Filesize

    673KB

    MD5

    2335285f5ac87173bd304efeddfa1d85

    SHA1

    64558d2150120abed3514db56299721c42c6fe58

    SHA256

    1b57a201184559164dedbddcb43bb110a18cafa19ea3d00fc23274ccfc420e94

    SHA512

    82737590d5ec7315ce8485c4794c01bfcce176ce443740a9f0cf5adfc3c3ed31a714556d33c1ca56db486636111d1ad855f606c87e5f322a505c535187ce2bde

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\python39.dll

    Filesize

    4.3MB

    MD5

    088904a7f5b53107db42e15827e3af98

    SHA1

    1768e7fb1685410e188f663f5b259710f597e543

    SHA256

    3761c232e151e9ceaf6c7d37b68da3df1962e3106e425cc3937d1f60170f3718

    SHA512

    c5edc25fd9a37673f769af1a1fd540b41e68351bc30b44bc83a1d0d4a8fb078888bbb31173a77ef47698631c9816bc05637b499c20d63e3d65457d9aa4bc2c6b

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\select.pyd

    Filesize

    28KB

    MD5

    1e74ba085eb08a3affe5f5fabaaa6caf

    SHA1

    46e3efbd21dc0a2c7650ed949bc7e7e91b37efea

    SHA256

    36be2a85c1989dc171bde986950b81d3e9cda21f1d1bf2f81f7fe15ffefad511

    SHA512

    517a109490c3724a630a85471e28ff3c4f96c9810b96f5baa9b66473ef59ed4055e331c8da064a53bc12892fb674f417b3485e96f16015e1437cbd2ca67e87d8

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\sqlite3.dll

    Filesize

    1.5MB

    MD5

    4795be5e45a29f950d498522ada00b18

    SHA1

    0582ab22ad37750b4a48328127309f21b8a1df4b

    SHA256

    197cc4d88b062d5aa7a16827c659598bf32caef142e1cd6841ceb054bd461b3e

    SHA512

    8dbca2d0a891a1802b662194bf5e68a458419acf544251fe4b7c0f08f1a01522dc725bef18fbc05b3e72a7205f8667e79a15d3707a15715ee6993fa7fe017437

  • C:\Users\Admin\AppData\Local\Temp\_MEI37402\unicodedata.pyd

    Filesize

    1.1MB

    MD5

    06092dbacf3b009ad11376dfc5ed2acd

    SHA1

    2597d23469d65936fca20906ef41e1f999944210

    SHA256

    2f9e76a8148029ade3e8f61d014d79a9b1c154cc9b5d6608f50fc478170ff676

    SHA512

    c782ebb9139a6b358d6e55cca3f018e421747984245fafbd150696b152763f2a6d08a21a0185f49df867dfabf5f066631a55f324abfed4e8bece8f85ead81c85

  • C:\Users\Admin\AppData\Local\Temp\crcook.txt

    Filesize

    29B

    MD5

    155ea3c94a04ceab8bd7480f9205257d

    SHA1

    b46bbbb64b3df5322dd81613e7fa14426816b1c1

    SHA256

    445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b

    SHA512

    3d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05