General
-
Target
d024b1a864534608ac4a4b08775cac93_JaffaCakes118
-
Size
2.9MB
-
Sample
240906-wmzxcszgqm
-
MD5
d024b1a864534608ac4a4b08775cac93
-
SHA1
68ee27c2560d2250f322723269538a6eb0590f10
-
SHA256
1b1fdfdd3eb5b6fb1597944eb0325ff9bc692ba3c2d7eaa8dfe34c4093ba78bb
-
SHA512
ebc3a374d42d4ecfe34c1ad03c9bcd8dc322b4ae73da3859c044492aa63f0a3f5c2f4b1a3d6a3523496e0340e0bab45c5b820269ee5334157f89a38e5f8f42d5
-
SSDEEP
49152:TTl7ZHD8HaUQv3LLX4+xtKeOs25QIKTkki5oEP6QPKDQYb3ZkrU6QKwZBD:99nomMsCEGriQiXCrUkwZBD
Static task
static1
Behavioral task
behavioral1
Sample
冒险岛强强/MD5查询.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
冒险岛强强/MD5查询.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
冒险岛强强/QQPro.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
冒险岛强强/QQPro.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
冒险岛强强/冒险岛地图_766冒险岛专区.url
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
冒险岛强强/冒险岛地图_766冒险岛专区.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
冒险岛强强/冒险岛强强101228.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
冒险岛强强/冒险岛强强101228.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
冒险岛强强/MD5查询.exe
-
Size
28KB
-
MD5
68ad88cf233ee3e050357df03742600a
-
SHA1
c609a0a7b5950b7b6210176c72fbb58405c4721a
-
SHA256
fd9aa4ca79033a4c8481a8ff9e32c6493dcc66e023605c3c509e7d485c57005c
-
SHA512
9919d28f58ec577871164612c00334675b7a31c7b80bc3a044316e0aa6962c0513d1ab4b9b96fd116932331708d655d22830633a0367bf70dc5aac5e54decaba
-
SSDEEP
384:ZHSq3bc4ivsSLzwG27W6k2TzFtwX7ryFsoqN1XA8E3wH4MZd9R41PJxCi+e:VSq3bc4ivsMwUBLrZncBxCY
Score3/10 -
-
-
Target
冒险岛强强/QQPro.dll
-
Size
624KB
-
MD5
3f22e559726aa0bec0c38401274f6c5c
-
SHA1
bb688e98d3afa0c1d62b93c0a622803961f05ab7
-
SHA256
4088c3c5fe9b718047ec75269e92e57b5d6e4faa0366b884910ecdf1473cfcf4
-
SHA512
e8ebf6b556fcf97f58a1aaf6f0d8e43044fda99833fa2dee8e1c136ed633805cc1a3a00ab105cd8534811832e93117b835a39d8440b145326ecd5443a43e9751
-
SSDEEP
12288:dEpD45YyyHt/OGUsvtoerFIr5MFBuLB8DY9aak/+xI2SlfvQ9jpgx4r:+aUt/OGvlpIr5MoSY98/DlfI9+mr
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
冒险岛强强/冒险岛地图_766冒险岛专区.url
-
Size
196B
-
MD5
646fd9ba5977ad674dcf51a655f0173b
-
SHA1
81d9dc71d8707298784bd9cdd203f46193f66456
-
SHA256
c92cb39c7d698305e185084711ae4e4f0180efeb99e1816dfe1c7d105f1a3ffd
-
SHA512
11484b48597683ca6c64bfb75af1eba731c11666f136aa62c49b48e870786fb31f233153d72182fba9d3e3f54e2efb2f8fe76b55955727fda02aa10a10952046
Score1/10 -
-
-
Target
冒险岛强强/冒险岛强强101228.exe
-
Size
1.5MB
-
MD5
4dd74c3e68afbd5938d11252e6bf4cb2
-
SHA1
7786944b71228c978044cdd4710d5fa3790de567
-
SHA256
c0a13cda69554b335cc7c88f248cabf985e00c061a3dff4dd16c8de182b78535
-
SHA512
390a8646f4c2a59c8be38d00d37f8ec867a12be36ba6ccc4c9e97d5f29310bcf464946471bc4d486a14523daf6ccebec808f942f6d40760010dc9aad54d5e542
-
SSDEEP
24576:Qo8fXyjlGTnbwFynSpIz8/JXgboU7DogtCltKOIo7c1WfFl4EzIq6YgVMrPIfmf2:QffkAASSpIzUX/U7DfClcOIo7c1Wfn4v
Score6/10-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-