mexFunction
Overview
overview
4Static
static
4eqxra.vbs
windows7-x64
1eqxra.vbs
windows10-2004-x64
1eqxra1.vbs
windows7-x64
1eqxra1.vbs
windows10-2004-x64
1mice.dll
windows7-x64
1mice.dll
windows10-2004-x64
1rkf78.vbs
windows7-x64
1rkf78.vbs
windows10-2004-x64
1tlto_matlab_snopt.pdf
windows7-x64
3tlto_matlab_snopt.pdf
windows10-2004-x64
3Behavioral task
behavioral1
Sample
eqxra.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eqxra.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
eqxra1.vbs
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
eqxra1.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
mice.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
mice.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
rkf78.vbs
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
rkf78.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
tlto_matlab_snopt.pdf
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
tlto_matlab_snopt.pdf
Resource
win10v2004-20240802-en
General
-
Target
tlto_matlab_snopt.zip
-
Size
110.4MB
-
MD5
0ba864c2b17042de8dfa7ac4c4d9fb5a
-
SHA1
326cdd89b77094cf158d0efc392fc0215bc7cf8e
-
SHA256
b0975b82c683b478f572d0e029c76c5bd7008fe696b6800af61fcdc4543dd906
-
SHA512
611292d9ac70f6c1f791f497cd2d105eb0dbc1156806e945a2124a96c55d1ae4dd3e1050f0aec8c2ad22a0748e6e2976584aa98cdbecc4247728a6c1238dbca1
-
SSDEEP
3145728:b2FGg7Vf2EpRZ9MAHw8s0q6Q7KJVYnvwqyl:bb+Veuj9MAHhpTYnvwb
Malware Config
Signatures
-
HTTP links in PDF interactive object 1 IoCs
Detects HTTP links in interactive objects within PDF files.
resource yara_rule static1/unpack001/tlto_matlab_snopt.pdf pdf_with_link_action -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/mice.mexw64
Files
-
tlto_matlab_snopt.zip.zip
Password: infected
-
anmp.m
-
atan3.m
-
brent.m
-
cspice_furnsh.m
-
cspice_kclear.m
-
cspice_sxform.m
-
cspice_unload.m
-
de430.bsp
-
earth_tod.tf
-
eci2orb1.m
-
egm96.dat
-
eqxra.m.vbs
-
eqxra1.m.vbs
-
erot.m
-
etilt1.m
-
find_leap.m
-
funarg.m
-
gdate.m
-
glambert.m
-
gravity.m
-
jd2str.m
-
jdfunction.m
-
julian.m
-
mice.mexw64.dll windows:5 windows x64 arch:x64
Password: infected
8f3ab54531e424ca58f6787e6ff1e13d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
Imports
libmx
mxGetClassID
mxGetNumberOfDimensions_700
mxGetDimensions_700
mxCreateStructMatrix_700
mxCreateLogicalMatrix_700
mxCreateCharArray_700
mxGetN
mxCreateCharMatrixFromStrings_700
mxCalloc
mxGetNumberOfElements
mxMalloc
mxFree
mxCreateNumericArray_700
mxGetPr
mxCreateDoubleMatrix_700
mxGetChars
mxGetField_700
mxDestroyArray
mxSetField_700
mxCreateLogicalScalar
mxCreateDoubleScalar
mxGetData
mxGetString_700
mxCreateString
libmex
mexAtExit
mexErrMsgTxt
msvcr90
_access
_isatty
getc
_mktemp
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
__crt_debugger_hook
__CppXcptFilter
free
malloc
memset
memmove
strncpy
sprintf
isspace
sqrt
atan2
cos
sin
acos
asin
fprintf
__iob_func
floor
pow
sinh
tan
memcpy
exit
abort
signal
fflush
fseek
_errno
ftell
fwrite
fread
remove
fclose
_fileno
ungetc
feof
putc
fputs
rewind
fopen
strncmp
log
exp
perror
freopen
tmpfile
atof
isdigit
clearerr
cosh
printf
atoi
_localtime64
_time64
_encode_pointer
_malloc_crt
_initterm
_initterm_e
_encoded_null
_decode_pointer
_amsg_exit
__C_specific_handler
kernel32
DisableThreadLibraryCalls
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
Sleep
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
Exports
Exports
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 297KB - Virtual size: 296KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 96.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 688B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
mice_spkezr.m
-
mice_spkpos.m
-
mm2000.m
-
moon.m
-
naif0012.tls
-
nod.m
-
novas_times.m
-
nut2000_lp.m
-
obliq.m
-
oeprint1.m
-
om_constants.m
-
orb2eci.m
-
read_gravity.m
-
read_leap.m
-
rkf78.m.vbs
-
rv2bp2.m
-
sun.m
-
svprint.m
-
tai-utc.dat
-
tdb2utc.m
-
tlto_2017.in
-
tlto_eqm.m
-
tlto_fpa_event.m
-
tlto_geocentric.tif
-
tlto_matlab_snopt.m
-
tlto_matlab_snopt.pdf.pdf
Password: infected
-
http://earth_tod.tf
-
http://en-USnaif.jpl.nasa.gov/naif/toolkit_MATLAB.htmlen-US.
-
http://naif.jpl.nasa.gov/naif/
-
http://naif.jpl.nasa.gov/naif/en-US.
-
http://scicomp.ucsd.edu/~peg/
-
http://scicomp.ucsd.edu/~peg/en-US
-
http://ssd.jpl.nasa.gov/pub/eph/planets/bspen-US.
-
http://tlto_2017.in
-
-
tlto_plot_2body_geo.tif
-
tlto_plot_2body_sele.tif
-
tlto_plot_nbody.m
-
tlto_plot_twobody.m
-
tlto_readdata.m
-
tlto_selenocentric.tif
-
tlto_shoot.m
-
tlto_twobody.m
-
tod2eme.m
-
tod2iau.m
-
twobody2.m
-
twobody_objective.m
-
utc2tdb.m
-
zzmice_dp.m
-
zzmice_str.m