Resubmissions

25/08/2024, 14:19 UTC

240825-rm6yfszfrr 7

Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 14:19 UTC

General

  • Target

    BORATrat2024.exe

  • Size

    9.9MB

  • MD5

    6681923b59c01f862b7fb20182a3901b

  • SHA1

    4242f33bd96d9a6ade283aeb6af6b49c80cfccc3

  • SHA256

    87f65b253fd3379d9dde4524e0ebf4baceb282ec8f025d1765a69ae5c5695b7a

  • SHA512

    8df3d0dd600e3e228ac60dfb7af1c7d161ae0268a2d1793a55f666a965cd39eaa6f355d60c50968771a45c1b4e2ce6960ffaee13b427d0986f77bd264807bd65

  • SSDEEP

    196608:tAvmQOfJf/priQPhVBICX82UmZ1U/f5vboG++EVDjjglfkp8d7REM4NI:SO5JXhiQPn5Xj1OfVbboifkp8xU+

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\BORATrat2024.exe
    "C:\Users\Admin\AppData\Local\Temp\BORATrat2024.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2780

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.