General
-
Target
aspyxia cs2.zip
-
Size
8.8MB
-
Sample
240802-q59lmaxcmj
-
MD5
c15c304c1ecfb71c61d26c1504f7341c
-
SHA1
565636a1953d712ccc318a35eb7efd700b288f79
-
SHA256
3b2918b2a20fe71ed6bc43c410dfb3b29c1d17fc52e940d3326c0c9e99b7ee39
-
SHA512
8c0a796badccdf29ec6f9f7adf805520b89370365f259ed4c56cc5709f522f492031ec1bb53833b415ac77496a35397c06a48b7b83bba748cf43c1d7084eb747
-
SSDEEP
196608:MD5ektUw8dOuEOQQBsXVq4TXkTtieHFVdANEgNTSsjSOhd7Ccqx/UgC88g:k3KOBBO4TXkTkNPTSs+Ob768gCK
Static task
static1
Behavioral task
behavioral1
Sample
aspyxia cs2/!Read_Прочти.txt
Resource
win10v2004-20240730-en
Behavioral task
behavioral2
Sample
aspyxia cs2/aspyxia.exe
Resource
win10v2004-20240730-en
Malware Config
Targets
-
-
Target
aspyxia cs2/!Read_Прочти.txt
-
Size
528B
-
MD5
7f91417e1849b7c949a694add4733101
-
SHA1
43b35c642b2a744a29242259b9b7cd981f6dc205
-
SHA256
30d5eaf14285a96d0b748e03e0fd80a3b9edda55b21c4b469baabd3096c9680d
-
SHA512
8abea88e1caf39bb22fe7003ed607994f71f52c739fe4484ebeee5bba3397960a2ed70ebd8b7f50f15b8e807ea4fbd66c29e22be4d37e55e2a78da723959d579
Score1/10 -
-
-
Target
aspyxia cs2/aspyxia.exe
-
Size
8.8MB
-
MD5
f021ccfabbad6889e548d13301f7e874
-
SHA1
c09f050149c039559826dee51d471830fb2c218e
-
SHA256
f18cce6e1f2899ce0f8e6b82cdbd4b474f695e8bb0d072c4e1935f94aad35fea
-
SHA512
6bfd4ac85ccb22ae66a6802b56f21551973733958880efd948a07a9855894d24aaea3cfcdb48ccb19bbac7ad902be771c3335ce72e0f519c0aeee8d0e1df85e1
-
SSDEEP
196608:5D5ektUw8dOuEOQQBsXVq4TXkTtieHFVdANEgNTSsjSOhd7Ccqx/UgC88:53KOBBO4TXkTkNPTSs+Ob768gC
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Indicator Removal: Clear Windows Event Logs
Clear Windows Event Logs to hide the activity of an intrusion.
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Defense Evasion
Impair Defenses
1Indicator Removal
1Clear Windows Event Logs
1Modify Registry
1