Overview
overview
7Static
static
3Downloads.zip
windows7-x64
1Downloads.zip
windows10-2004-x64
1Mario Kart...n).nds
windows7-x64
3Mario Kart...n).nds
windows10-2004-x64
3Mario Kart...n).sav
windows7-x64
3Mario Kart...n).sav
windows10-2004-x64
3melonDS.2.ini
windows7-x64
1melonDS.2.ini
windows10-2004-x64
1melonDS.exe
windows7-x64
1melonDS.exe
windows10-2004-x64
1rc24-dns-s...64.exe
windows7-x64
7rc24-dns-s...64.exe
windows10-2004-x64
7RiiConnect...er.pyc
windows7-x64
3RiiConnect...er.pyc
windows10-2004-x64
3Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 09:24
Behavioral task
behavioral1
Sample
Downloads.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Downloads.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Mario Kart DS (EUR) (En).nds
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Mario Kart DS (EUR) (En).nds
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Mario Kart DS (EUR) (En).sav
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Mario Kart DS (EUR) (En).sav
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
melonDS.2.ini
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
melonDS.2.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
melonDS.exe
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
melonDS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
rc24-dns-server-windows-x64.exe
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
rc24-dns-server-windows-x64.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RiiConnect24-DNS-Server.pyc
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
RiiConnect24-DNS-Server.pyc
Resource
win10v2004-20240802-en
General
-
Target
melonDS.2.ini
-
Size
1KB
-
MD5
ec1bb8461c9cf790ee358fcfc3f132cd
-
SHA1
07b986462b91cb031385b57dd4387ece910191be
-
SHA256
521a5da3d10b2f394fe494ae37363d27a62984cdd18d8d690a2b5038a8e3b287
-
SHA512
9251d740edc2815be24a64865f76b6f292ec137685ef90d170c9d5541c697f7b59c29e018b954ce06f03287ae5abaade09669b34425125fe8bd38270b55d2c67
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2300 NOTEPAD.EXE