Overview
overview
10Static
static
10The-MALWAR...de.txt
windows10-1703-x64
1The-MALWAR....A.exe
windows10-1703-x64
7The-MALWAR....E.exe
windows10-1703-x64
9The-MALWAR....a.exe
windows10-1703-x64
The-MALWAR...ks.exe
windows10-1703-x64
1The-MALWAR...lc.exe
windows10-1703-x64
10The-MALWAR...re.txt
windows10-1703-x64
1The-MALWAR....l.exe
windows10-1703-x64
3The-MALWAR...ck.exe
windows10-1703-x64
3The-MALWAR....A.exe
windows10-1703-x64
3The-MALWAR....B.exe
windows10-1703-x64
3The-MALWAR...de.txt
windows10-1703-x64
1Resubmissions
25-08-2024 18:37
240825-w9lm9aybld 1025-08-2024 18:31
240825-w6eqjazcpm 1025-08-2024 18:25
240825-w2whgsxgjb 10Analysis
-
max time kernel
14s -
max time network
20s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
25-08-2024 18:37
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Net-Worm/Blaster/Blaser.C.sourcecode.txt
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Net-Worm/Blaster/Blaster.A.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Net-Worm/Blaster/Blaster.E.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Net-Worm/CodeRed.a.exe
Resource
win10-20240404-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Net-Worm/EternalRocks.exe
Resource
win10-20240404-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Net-Worm/Kolabc/Kobalc.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Net-Worm/Loveware.txt
Resource
win10-20240404-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Net-Worm/Opaserv.l.exe
Resource
win10-20240611-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Net-Worm/Rahack/Rahack.exe
Resource
win10-20240404-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Net-Worm/Sasser/Sasser.A.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Net-Worm/Sasser/Sasser.B.exe
Resource
win10-20240404-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Net-Worm/Sasser/Sasser.c.sourcecode.txt
Resource
win10-20240404-en
General
-
Target
The-MALWARE-Repo-master/Net-Worm/Sasser/Sasser.A.exe
-
Size
104KB
-
MD5
ef1952b755ba912b9f60b2ed8dd68d30
-
SHA1
dcabadcf6f4a6079c8373ab2eb94b8ffeebd8d96
-
SHA256
b2fa6edaa5ffc51d12150424355a0c86ac9f46d7ec772d35ab8d9f4fe7996d91
-
SHA512
dd088f3ba5f97ae379d005ab252dd6aa98e10f81ef70d3029bfb4ece7bad5dde7558f25711c229bee6f5901bed980159fa82f217f281ce7476ee30e90a598729
-
SSDEEP
384:k/exp+OvWEcAB9KybxgUamOUOtTMmlTD1DtkzyQ+dTXr9421qYGI6s37uP:k/WpR606UahvXDDkuRBXr9115Gq37uP
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1240 3316 WerFault.exe Sasser.A.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Sasser.A.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sasser.A.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Net-Worm\Sasser\Sasser.A.exe"C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Net-Worm\Sasser\Sasser.A.exe"1⤵
- System Location Discovery: System Language Discovery
PID:3316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3316 -s 2722⤵
- Program crash
PID:1240