Overview
overview
10Static
static
10release 2.21v.rar
windows7-x64
3release 2.21v.rar
windows10-2004-x64
3RUES.EXTv2.13v.exe
windows7-x64
7RUES.EXTv2.13v.exe
windows10-2004-x64
9discord_to...er.pyc
windows7-x64
3discord_to...er.pyc
windows10-2004-x64
3get_cookies.pyc
windows7-x64
3get_cookies.pyc
windows10-2004-x64
3misc.pyc
windows7-x64
3misc.pyc
windows10-2004-x64
3passwords_grabber.pyc
windows7-x64
3passwords_grabber.pyc
windows10-2004-x64
3source_prepared.pyc
windows7-x64
3source_prepared.pyc
windows10-2004-x64
3_license.dat
windows7-x64
3_license.dat
windows10-2004-x64
3imgui.ini
windows7-x64
1imgui.ini
windows10-2004-x64
1readme.txt
windows7-x64
1readme.txt
windows10-2004-x64
1version.dat
windows7-x64
3version.dat
windows10-2004-x64
3General
-
Target
release 2.21v.rar
-
Size
79.9MB
-
Sample
240829-v5a6aashlc
-
MD5
cbca16a30d933481b2b42ad9ebf04e6c
-
SHA1
68a9ead8c6c56bf8796a7c8483f3870f566696cd
-
SHA256
3953661397d96baa773cf45497e1f8216046663172924fed0c8f0fc5b32bc18c
-
SHA512
fa1656511758a4edeaea838d3847cd8f588aeafe72557fb0ea442418c874bd117945e2cdc642173d96471d7d418f20d603ae21a91b48c20abcc3fdc758b99c29
-
SSDEEP
1572864:Xf54DKqY0wZE3HMkvfuT0m0IcAZmu94KqPyaBL94xDT7vgUA33ZtW:hGKr+XBO70vu94FIDT7vBA5o
Behavioral task
behavioral1
Sample
release 2.21v.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
release 2.21v.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RUES.EXTv2.13v.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RUES.EXTv2.13v.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
discord_token_grabber.pyc
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
discord_token_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
get_cookies.pyc
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
get_cookies.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
misc.pyc
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
misc.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
passwords_grabber.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
passwords_grabber.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
source_prepared.pyc
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
source_prepared.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
_license.dat
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
_license.dat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
imgui.ini
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
imgui.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
readme.txt
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
readme.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
version.dat
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
version.dat
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
release 2.21v.rar
-
Size
79.9MB
-
MD5
cbca16a30d933481b2b42ad9ebf04e6c
-
SHA1
68a9ead8c6c56bf8796a7c8483f3870f566696cd
-
SHA256
3953661397d96baa773cf45497e1f8216046663172924fed0c8f0fc5b32bc18c
-
SHA512
fa1656511758a4edeaea838d3847cd8f588aeafe72557fb0ea442418c874bd117945e2cdc642173d96471d7d418f20d603ae21a91b48c20abcc3fdc758b99c29
-
SSDEEP
1572864:Xf54DKqY0wZE3HMkvfuT0m0IcAZmu94KqPyaBL94xDT7vgUA33ZtW:hGKr+XBO70vu94FIDT7vBA5o
Score3/10 -
-
-
Target
RUES.EXTv2.13v.exe
-
Size
76.8MB
-
MD5
53fa6aaa2bf0fa8ff39523e41762a4b5
-
SHA1
031420d84303cc0764a78e4b6c562d2e0ae09fbf
-
SHA256
0faa6e0066477085639fe21d56f8f64d43d32bce9ceb6cfda00d9e08332667d6
-
SHA512
f3bace1297a80459d0f995eb49fdfc1a5fc5c9171e60d3f44423f4bfc2564d21bb291c9f05906b3d7e3b51b5a67a50dc4ed328553faded5be769dabe78fb8a9f
-
SSDEEP
1572864:IvHcRlKW5h7vXSk8IpG7V+VPhqYdfME7tlHegiYweyJulZUdghhCreDEjV37U:IvHcRY6hTSkB05awcfLdMpuFhCrOQo
Score9/10-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
discord_token_grabber.pyc
-
Size
15KB
-
MD5
00f03a943b3dd6a58279bbff482099c8
-
SHA1
56c88f03a5f5d5abae141bc94bf287ce41347dbd
-
SHA256
5065f9a9e6699be80d98291b3e9896330dd2595373e5ca58ced55934b2865a90
-
SHA512
01b462a02fdab26596f42b3feb783252cebc4a3132e1ef9c73660a74c7e9de2dedebe7e69cf795183dc7bd2baeccea9596387ebd285b263067e30fb681671db6
-
SSDEEP
384:YGC7RYmnXavkGP3ltcrhntQ5saa2holHVA:YGCuvkoltcrttQ5saaCgHVA
Score3/10 -
-
-
Target
get_cookies.pyc
-
Size
9KB
-
MD5
b3e069a6d0520f658a3fd652a6e51ca0
-
SHA1
3e2590a43b110ec23dbbe4e55145c6f1cd27800e
-
SHA256
232fb80756e38b78775ec75d7ee46d15ac394ed7d197b577b2c98dd00709b007
-
SHA512
54a3cc21d321003808c2e1b9d52c06738ea0c80842d57ed754b05ff493157b22805a4d484bc46804d83ec052db535ceeb79708087355103cf75e3d2c9e0ce5bb
-
SSDEEP
192:kNal3eiNis9QfUF2x3NC79F211G67+EtAhN:kJiB2XtF7jKkAhN
Score3/10 -
-
-
Target
misc.pyc
-
Size
4KB
-
MD5
3af0657bf4d2cdcd8e84aeee71be06f7
-
SHA1
bd28a025931e96da24c9818e1a1648d2ce7f5212
-
SHA256
83bbb656424fab009b612232bab4970a8bd49c944285975babb3de8f99db9da6
-
SHA512
a402b759e427ed78e55650b9188772916787a1734f5dd5a5782d98228c7c9da11057627bcad29aa94139a9c20b1c4ca2e8c92983b38384245855f6da3369dace
-
SSDEEP
96:ySMlhlvyz7DweHPF8+VB7sHIZGQSWfvmyyZ1k9qHub:Lolvyzgevq+VBXZGQlvmV1kkHub
Score3/10 -
-
-
Target
passwords_grabber.pyc
-
Size
7KB
-
MD5
91bebfc811f4706852fc415d7b2cc836
-
SHA1
26a7645c5b2590a29bb403cb7be00c3ad5e575b3
-
SHA256
fb77fa8b2407db4127a67e37188e0d722c981280b605f6173d737f39e3582dce
-
SHA512
1e5ad7a82f60df0d8bc048ff31ca716cc93d1e167ef9f53e916a608b5a7709f884b657854848a9b6e586f994c010f00dba55c9c76f864b93594ff2ce9fddbadd
-
SSDEEP
192:h114qWLfhuUIxDPK2cxDJb+XUhitovgEuz:V4qWLfMFyVxDAE/4
Score3/10 -
-
-
Target
source_prepared.pyc
-
Size
172KB
-
MD5
3f170efcab5ceab1522b27b4663c2b5b
-
SHA1
296dd25776ea22fc5412b3d9643892726b720c3d
-
SHA256
c601784ec813d0026bfdaf8bc132cbfccf0097a92fcef9a65daaa60ef7b956a8
-
SHA512
b4eadce3eb7c1bea03b0aedf80a1e8588f68c7980fe4c0cadab020c9430c1523a499b958cb6eeadc97afa5ece2086c6bf82949be537b4a82155147bb4c098bab
-
SSDEEP
3072:+rH8X0aOO9nY1OzLro6PZTw0I1ScQaQV+G0IvdXzsFsTWn:+rcX0aOO9nY2roaIoREGmsM
Score3/10 -
-
-
Target
_license.dat
-
Size
48B
-
MD5
54716b69a7147548f843476f9ca9b417
-
SHA1
96cdb80b43b1f37ce4a048306b5e7d4aab3f25f3
-
SHA256
71a9034cdf48193b2f3e276e30a0983ead77c3441fe0567a48b6be8ac2b42c53
-
SHA512
c94ebce3bd1132261710c763d749833adf5cda6f9533f0cc4f123f333ddb996504009e12464b10fb97a994d2c17201b2d95b1b0839f9fee9b23a010c0eba5a36
Score3/10 -
-
-
Target
imgui.ini
-
Size
284B
-
MD5
70483f3fc77a8a009f844e58a9554f86
-
SHA1
39f1390c92474a0542e1dd242123988a9298cf0c
-
SHA256
bab42c05219b25dce03ae92e55e79089529ddbe477dae50be69502ed446611e5
-
SHA512
98709fe119b0a082632ae7f09f7a4631f936e977f5ba463fdcf55464d7ede2eab467e298c679c6e5cd4b84f81ab1ded32db887eadaec49cf5b2f284cc480709d
Score1/10 -
-
-
Target
readme.txt
-
Size
524B
-
MD5
6aa07026fd740c5d0d015bb7c8ba6579
-
SHA1
18d378322001d2d5bbb460e89821a09d9e8380fc
-
SHA256
5d345d8f7e0b81d45aefe56be81a3e44991e427a61078cccfa7d86814d6aae09
-
SHA512
01a1fb429b7a8222450fbd73cd9024daba332ea9e8c2dbfbd83d5a971b8b108c4b41fde68df302a97a33e7da2e6cbf5bec488ab2a779ad81e204bacd70af4b93
Score1/10 -
-
-
Target
version.dat
-
Size
12.0MB
-
MD5
3a43bf84db7c06571f932b32c8e45d4c
-
SHA1
4d51d9385107ba98f0b3dafc12a5c8c4d3bd0846
-
SHA256
eb2d24b5c941c1a081076f2d31ece01d97f3d1ce5b3df22105a6a21b8a4932bd
-
SHA512
f72e8dffc2162d52f0bce05986418a61952cc567ac5f9b3f575b6dfe11832fc1f14e80f3cf68ba5313e70bfd7e5e1d6ce7c76eb9f7a85493c4031fdea09fe323
-
SSDEEP
393216:xMAnhGpSDbURuocn9bpbeWk8eSYkvEgvDtUySD7mVNbT1cUbPB5QBzBlFNBiRRi4:uu1cUbpqN7iRRx95qDS
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1