Overview
overview
10Static
static
10MailRanger...YZ.txt
windows10-2004-x64
1MailRanger...YZ.txt
windows11-21h2-x64
3MailRanger...er.exe
windows10-2004-x64
7MailRanger...er.exe
windows11-21h2-x64
7MailRanger.pyc
windows10-2004-x64
3MailRanger.pyc
windows11-21h2-x64
3MailRanger...te.exe
windows10-2004-x64
10MailRanger...te.exe
windows11-21h2-x64
10MailRanger...r2.ini
windows10-2004-x64
1MailRanger...r2.ini
windows11-21h2-x64
3MailRanger...!!.txt
windows10-2004-x64
1MailRanger...!!.txt
windows11-21h2-x64
3MailRanger/ServerList
windows10-2004-x64
1MailRanger/ServerList
windows11-21h2-x64
1MailRanger..._1.mp4
windows10-2004-x64
6MailRanger..._1.mp4
windows11-21h2-x64
6MailRanger...es.txt
windows10-2004-x64
1MailRanger...es.txt
windows11-21h2-x64
3Analysis
-
max time kernel
86s -
max time network
97s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-08-2024 21:06
Behavioral task
behavioral1
Sample
MailRanger/237K HQ Skull.XYZ.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
MailRanger/237K HQ Skull.XYZ.txt
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
MailRanger/MailRanger.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
MailRanger/MailRanger.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
MailRanger.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
MailRanger.pyc
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
MailRanger/MailUpdate.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
MailRanger/MailUpdate.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
MailRanger/Mailranger2.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral10
Sample
MailRanger/Mailranger2.ini
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
MailRanger/Przeczytaj!!!!.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral12
Sample
MailRanger/Przeczytaj!!!!.txt
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
MailRanger/ServerList
Resource
win10v2004-20240802-en
Behavioral task
behavioral14
Sample
MailRanger/ServerList
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
MailRanger/how to mail_1.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral16
Sample
MailRanger/how to mail_1.mp4
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
MailRanger/socks4_proxies.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral18
Sample
MailRanger/socks4_proxies.txt
Resource
win11-20240802-en
General
-
Target
MailRanger/MailRanger.exe
-
Size
39.6MB
-
MD5
e98e7fec9ca811fcb78a2392bb434d82
-
SHA1
79be845afbc17f2f1bc048db34365a586b83ca74
-
SHA256
090a400f85935543d2d2097e88d4c82c11be639d5684a32829dcc695184c9ed6
-
SHA512
c81d1ec816d437dceb00b7cd42aed737eda06fdd3ac141cd882cfb0ea1652c8b0342642c815a333f22864c3bd782c120f8aa79f2dfa86fa5b64d10a939f904a5
-
SSDEEP
786432:ZrZr4zMnXWGlso5EYW4/YR+XmjsNNWonlSAmqRo1xnaHR/IG2cGP2suJNOMat:tiMXZd5Eu/J2jsNNBlSAmKo1xWRWcI2W
Malware Config
Signatures
-
Loads dropped DLL 59 IoCs
Processes:
MailRanger.exepid process 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe 4932 MailRanger.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MailRanger.exeMailRanger.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRanger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MailRanger.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
MailRanger.exepid process 4932 MailRanger.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
MailRanger.exepid process 4932 MailRanger.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
MailRanger.exedescription pid process Token: 35 4932 MailRanger.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MailRanger.exepid process 4932 MailRanger.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
MailRanger.exedescription pid process target process PID 236 wrote to memory of 4932 236 MailRanger.exe MailRanger.exe PID 236 wrote to memory of 4932 236 MailRanger.exe MailRanger.exe PID 236 wrote to memory of 4932 236 MailRanger.exe MailRanger.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MailRanger\MailRanger.exe"C:\Users\Admin\AppData\Local\Temp\MailRanger\MailRanger.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Users\Admin\AppData\Local\Temp\MailRanger\MailRanger.exe"C:\Users\Admin\AppData\Local\Temp\MailRanger\MailRanger.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD565c5093f0a614e3458f3c8bcd9b75a40
SHA1d9be75e43a33fc84ad954fe619fbd7038a93b3d3
SHA2569a536d35781669661a2bc87689cf2e08672c6f36524bf5d282e0fcb4f2f8e48c
SHA512de0213507421d6afbf3ff646a56150c800ebe1ee251a3da4fe3e3f9f2c2efb7977527b3037a335348750cbae40eacc554b099653ed735c956442d689159124e9
-
Filesize
10KB
MD592769d598356ad8ed1974636c7bdaa26
SHA14e52747078a1e4b817415186c1763b8636ee1a6c
SHA2565b7fa0484b45e631217d99ef0e166a13ccaa58d345ad168fa00121fc067b0d2f
SHA51288c9e3f860e8af42425c8a02486e9562fd36aa59dc4a9608b0bd3f03bc080c00b4a780e0f1682ae58077b31c99313a054ed22069abb80647ddf5890efba98ab8
-
Filesize
9KB
MD56ba20f7f7242e40fae5f92ce4fd2e5fb
SHA148794f39e6745e78fa45b49242090c86071aed1e
SHA256c6d46257e6bd8cef397cbc2c08a34e0ac05db57e769942c52b219e96206a5cf1
SHA512134a102b83960ab6bf0a5fc8629358566abcf8e73188853283077fcf21207a5d76d455a6a3e6cc3350b2dc8e91a220acc84caa1114684dc4d54681f2afa52197
-
Filesize
10KB
MD514a9bcf3ab59cdcc0ea9a7f6c986ebd3
SHA1a8051eb493d3dc85a2ad3220c7c89fbee0f78578
SHA25673e74b19989a2d9ca3d5cb7bd3bb4f3b2f6acda64548c2f755df7d912997854a
SHA51219bca6319e467104ccf0eca6a869a1fac743f4e9e67b37c9a1075519772c5d3ba032f09de2b1ebb745f1b40287175f01f0cb72ccd6c978a1d58c04812bfe00fd
-
Filesize
8KB
MD5bb3d230d75df5492a22bd976756eb3e5
SHA114d559a07eaa90117378c8b2f5e3b19fe40d290c
SHA256f949420cc183f495b6f64cc84d401968d1352bb64f7c0a2292ed060cdccb5b92
SHA512e55cf1f0c253ee09f26e9568e7043d7ec7ee4c6530eec238b63b1ed38b069fc03b69c9ecf2655c21dbad715141d697307995452b893b5ed7c9457b366db8084a
-
Filesize
9KB
MD552d35c56edd697e457f2fb754de5d398
SHA17d3d5827e89cce8e7f87fc7072e4cd3a1ed02e5c
SHA256e36d5bf1bb443fb988f1763cd39c7268a8c6d804b8ac51f85a67c2874ab059d8
SHA51246292238861fc7cbf70fe57bb6d3f7e7e5b185815114ee02888b6aa7035e1861d8184406e5b6bac2068557d1f27c483d97d08dd9b5a3c513088a28b84e619807
-
Filesize
11KB
MD57efeaf52fff22cb860a7c92de92ffc0c
SHA1d095836b2a6ec043558d2f8b77350abd34635eac
SHA2569ed3ca525d9335793cb8e1bcf6419d4bf71113c1d310568a0bbc110c1837ca7e
SHA51202ff625f55c70807912467c5534de7e00effe105480b3023eb5fd921ecb7ea2d656e549d5d4262941b5661e0aced7fe1a603d4da7346487886ebfa4ca545ee85
-
Filesize
12KB
MD5dc2148c6bf5434a0236f3b266285e0b7
SHA1c9711ef2bd032aed154026187ecfe718fdfb5fe3
SHA256c3d23a66f09e08c640615e32f35599b55dcb1de072010815abb0f42317d41e7d
SHA512017c2bb0c1b9edc413d17db16fbfcbd5009283285a75b60069211be7f595421c159398cb87204e19f46da539bd8027d4cbe0b8d9062b008fcaf9e2a463dc97be
-
Filesize
15KB
MD58e24e69cfc9dc64ca95ea4fe919bcde4
SHA1a39dfbd82631aeb65b127f8cd692c790cd9cc4ac
SHA2566754fbd887390e489fe9cf54b88bbb998a025cd653536766e10f4c876f53f3ce
SHA512ed4eeb7ba6930453fb81ae1b62360cd6e769cea7c3367d30cd2bde47dcb9e7adde5be6bedeb8cbaa44a59c5afd4e3cfce368a965aa06dfc15be3abc193949718
-
Filesize
17KB
MD51a4449791b81d89cd56424d68276091b
SHA1c64aa6424b80ff987a86e526402a1f1a4fa78f42
SHA25666bf675a8fae36fe3bd0c27532080f31d98b400f0bc9e93a407466a348725b29
SHA5129b1cc67e7a174ee583911a6e0c679b1f7b163874df7fbb5d3571a2c134a834bd76185d88a7ddca5cdbde01b4689fb94512616292e3484f6293698ea13ecb749f
-
Filesize
8KB
MD59e0185510264160edda4966e5de0bf51
SHA1febee32fc712f7bd96a375a744e08685774cad99
SHA256d2798c0500c642dfbb02202fab0922697b842bc3e68b6cf256956b3ff39f8044
SHA512fe7a9015d376452f7cce85d2f73c0aff63eae34962287f08a9fcf5706a728a78aa32238e2188af7fa6efedd2ae015ee95d0fbcb069be0f4b6e0e6cc2f9ad816e
-
Filesize
451KB
MD5f027303816d6d2afeab12183c67b1348
SHA1735e1625b17e4122608eb3aff3702b97e08f1e51
SHA25675ddc9778c23ee95b6c57db6b689f11c07d164d5a4c158d4c0acb87a520b8004
SHA512f55f6df42f266cc5f5f23690a5942068248d50d1c302708bf34d1f9d8831c7bfa174489de029dada30707df4544275b14fbb3dda09a0a022eb343e2618401797
-
Filesize
1KB
MD593c517f108f7547568cf68720d3ede36
SHA1f56d69c163a0a8a05477840aaa0f3413a04d2ab3
SHA2560b10a57d018a1e52169ec4835fa94af6590c0b0d1b071a1104c13ea1659abe23
SHA512e7fff1bb90be3c11c99674a9bb962576390aaf3af3953bc25e9c1309e432bad6447ff673108ceacff48e4ac3fedad4b7d33c47f5052e11329de9fe759462e570
-
Filesize
1.7MB
MD58cda6f3fbe0ed56c9d5e8adcebdbe8af
SHA15c2f697ac6470f733cb928f1dea16f9c510b578d
SHA25626b1d740327c0b5b60276412f64c98981765011d5c1b06e086aa2c0a465744ba
SHA51230dab860ba4256cb9c90a7e730bf9b1df6480a20f414431539f92f08eb750daa243915e2b72132e059b19b03909c4f8b1cb159aab5ab8d31dc2b8b908dfe1069
-
Filesize
1.8MB
MD5453a00592707fa83e90c66cba56e4465
SHA1a6dce074a70028b9c82706ca74e3ac7927942324
SHA2563202b0e3a483f57ff16612797a9076b427be83ed40268fcf99e13d4b67a9c79e
SHA512ed32411365de4f104107751eb8cedd84e3cf1f156970fc3742ddc16230b3686167da88e1c20b257c468485396e0b6f2fdce6319eff3f75c59e5a0f01f4031b58
-
Filesize
3.6MB
MD57d20267010586349c3439c6e110e0a1f
SHA1774aabcaf80b311a33ea5a2bdd37dc4a5f6a39be
SHA256771914976f6de9637c0f0044f46bdcf6f0ef82ce5701aa8b9adcba66e5d67f6b
SHA512fc93072f3d01f4ef620abd6518a5f847af629e2f0efe89db181a709b2fd88193728737908776def35f5c4528084826afb4cca5bbd02506429ad1f92a3380564e
-
Filesize
84KB
MD54fcff1a0d7e3020092ddbfc15d14f399
SHA10fe2cb09d5e8a40910fe06ccba971e0fd64971fe
SHA256e88bb6a429ba10da20067505e1e0b113501057b43efe3ba85ffe60d69d1703fe
SHA512a7c79dd149355c108a6fa4d32a4b5126247ce4a7e3ab4aa9dae466246340d5ccd3729fa204426f66eb14303e874ebf778e59ffb95421ba57a62079506c8e60c6
-
Filesize
4.6MB
MD5a4e6818a44cfb0f601456e2d23c67c20
SHA1874caf2e536bdc613e8adea6addfe51a4c84ace6
SHA2561f1018bcaa98f5aadc024caea1ab7cf0cb77242b6b9cb562b08b33edfb9c0feb
SHA512eb4dd961429dba56378ec8d098c9dd08fc4f8403b0eefe08e1e00d1eb875585f1f3d4d7fa4e073053605530637d58506e219fa3bc500183750f4d368209b1063
-
Filesize
5.0MB
MD586edb02afe0a28613fd21227be1c1eac
SHA16b37cb6162bacd3bf24be57f5d26e013b5b9aff7
SHA256438c2952f60fc45f6c5ede2aa71cf0ed8139767af544137b45f88c467f6cb444
SHA51265b10b11298ef8bf75edfeed604ee27956002753f611105328c25aa3aeadec6ba211d0aa74dc6a0e192ac1e2a573899b3ff59836e6c02fbdb3b8475115a75084
-
Filesize
4.2MB
MD5f5fcb173b7240d15e9880c10bbd0b6cc
SHA1c83828ce2c6d408fc0f3fba6869042be5a1654a7
SHA256a5f842520a10173d6165b8652fd0ffddd6270b38de13e9c02acc6a8b775778b2
SHA5127c175d73e4dc5dd43e29f35c9d9071ba2d0e4c36e337f46526ee8c6bb94c2016b4158058884fa9f4b3c6f8dcf221fa01ba19abae69b7afc0df65002e27008543
-
Filesize
84KB
MD5ae96651cfbd18991d186a029cbecb30c
SHA118df8af1022b5cb188e3ee98ac5b4da24ac9c526
SHA2561b372f064eacb455a0351863706e6326ca31b08e779a70de5de986b5be8069a1
SHA51242a58c17f63cf0d404896d3b4bb16b2c9270cc2192aa4c9be265ed3970dfc2a4115e1db08f35c39e403b4c918be4ed7d19d2e2e015cb06b33d26a6c6521556e7
-
Filesize
71KB
MD5055cfc5297933c338d8c04fd4e2462a2
SHA1bf8f97ee8136bfe3f93485e946f2069b7ce504e0
SHA256befc81440bbc001bd7647aca42962ee0b45b08435ee9f7140bf570af636b7dd5
SHA512308ebb33c47b73ecd9c4e4e54ffd09aae5a96019559ef7b2a37a45bd89c42d0d5bdd21da1835fffd84a138b03662c3d68bd72725a22f1b0ddf0329438819ead7
-
Filesize
131KB
MD5cbec7f862fbf28d4abecb9b775f57c70
SHA12d8d66c196c74cbce2d096f2855e5e3e96a4773d
SHA256d44b2bd724589c63b8d66fae2557b920cb8885199a5ecf1aa438a90ed68cdbd5
SHA512610c896ac3bf2c17d81dd34745ccef6f3aa967a0063ba11da3555f52031cbac7b7c3aac4d9450ebe23387087ab31b92407e9a906a5404a94261bce1ea3a11460
-
Filesize
105KB
MD506c45d47af92a68ea6da0cc861992034
SHA10e8814b489e2c50e4481b69d532ca51e53274747
SHA256b016e7ce9744a0e8fea473f1982e5d2fc355a98682054f470f4189d5fc00b8bf
SHA512397ae19e69bdfb8bb4ec8197e5ac718d409930c6ff9e6cff979cef665ffe19aa197cca9b5a03ce7d30529d27a489b15e2a813bce1428e8dec8eb63f2148408d6
-
Filesize
31KB
MD51280a084744ef726a673b757b9364335
SHA1203a83aee00f6dca7b5cf16f5d140ff5fb888bbe
SHA256c2b3dc92abd96485032d1287941e405d56df05fb5ba68199497d8594400163e5
SHA512637aa79bcfe2ac3f75319a4be3ee4e32769a52cf939a26564a73807b40e96328fd1e9b58e70abb0b4c204c77baeb61a5150f5ebc47a7262a9c520867f69f6075
-
Filesize
181KB
MD5d72665ea18965f103200ccc7ad072f85
SHA12b89543cd8bd1aa20e0d3150a3c394b90be0d204
SHA256ab20e63d14259a7deca85a068796476c0efcc236a11d53b1816fc6f8956424a8
SHA512aad0bcbeabaa50b1fdba4cf70fe281f58b62a81b680cc16ef7f238263625fc7bed9ae9321a7bf7010fe7b5bb28708bdfaa0138c4f35a52be6aaba71d03aaa3dc
-
Filesize
65KB
MD551a38a6bf4c7e3d71b21a88b7a1dd555
SHA17c10b8dbe3972e1df92393b01523a9f843c24ed3
SHA256b7829ec5c6de17b30037e1b50f43e26b40fcd9acdabce0011d623f5c0cebd70e
SHA5126d068e2418da43581e0cd3cbed606b89d9a095fdddd348c72e9dbbd9f2dc580ea445c6c972616620ad444268e1e489efff6b528395e27c4a98ecca953258e7a4
-
Filesize
767KB
MD51311f2203122801083599122d9f84d2f
SHA1d44b76958d72c409f9595e235e55fc271a8800e9
SHA2568418fa28b6daca980d076e7558e8f550e1413fcf65ab930068fad100e3a35a58
SHA5127650b9abff98df08c0bf260babf97d2ebf66a28944248aa651e25ec82b96e147bdffcf0393cb2ee6a09ef7b8d52f9b5dcf53c5613644272f39c1e60188fabea1
-
Filesize
1.8MB
MD525c9d6fa8bf1222e82a37ef982f418d2
SHA1e4bed3d1e76a58fc0119b7a2e70a998ca9ea7202
SHA2563f70a63aacc024c4cd599ff1e12bf5b685719cf2b92c4420fd20ab032c9c898c
SHA5122d6daf0e16971f9a6c1153bd67ff7fe2b1dbdeb5d05ea743cae231b85c9a27c4ee365f9c2141ea30a1edc9ebb32aa8a103b4949b5a0d9d031ad30acb2e9c60e5
-
Filesize
164KB
MD5ea5e7e997193098c2259119a37c7e4c4
SHA176e68dc830b8c0170916fbfcf84e26e74905f292
SHA25640b17f3dff41e29492c8519372d435cd973f0a67597663fb12ad6756eaaa9077
SHA512114eaf17bd29a7c1c9c17a8518f9bc5f215fe363e389ee84b3dbb87ff3f0418ebc435cee7b35f4d5ee48614381ef2e1eb8a67108e0b9816d4409d8b30a941d37
-
Filesize
57KB
MD551cacdece9da16b095bb06dac8e04d5f
SHA1aa0782ddc2ee4275061a53d85122b68fe297bc02
SHA2566b2ee6ed6617753c8859e3c6fc7af863843c6827045be9f233af8ae316418550
SHA512d7514582b74b135a3a36971ae83bb8ce174e09f25e1fe00c8a8d6f0324602e892613dcdc4c21846ebb4fd31dd7a6c8c559cddb751f4b8ce064dac8d29b678db9
-
Filesize
3.5MB
MD5198dc945fa3a7215c2aa90bd296025b4
SHA1ce991e920755d775d99ab91f40124f0aad92863d
SHA25620cd780cf1e90778799e749812b00b1865938ef8990cd9bf2c1630787c6181c9
SHA512a880aa55740e635e3fbd32b8128572b92f379913d405f3baf4e9ec67891ac3dd77dbed85074a958c89093ca378dac95733287a45ca89c75029a61ecde058c955
-
Filesize
22KB
MD5cefff42d83a7dafe76d22589978aa085
SHA16cb9b60804a8b8fd19fe23612b4018cf1fd76854
SHA256f8bf0c9909ee65038f5bfdb47c7ee037bf55c97d5be259aa904d4e53a9b5cd34
SHA5121b2dbb98b543acc49db3647edabc32f5fba8880ee631b146a2078e1c7ebd867682245f4bf177252e92f0c297352b5ae734764154ed5e4c5878687b4f502cf35b