General

  • Target

    RtkAudUService64.exe

  • Size

    74.7MB

  • Sample

    240907-l13kasybjk

  • MD5

    3043c13e74eab4e910dc2a3f2ff9a97d

  • SHA1

    128f6df1a59a97296dd7e95fec3875ea8c0ba0c3

  • SHA256

    3fcdf428a7c2853ade38ee0dc6c4e8ac9598a3e0dff99879fd7524c270c7967c

  • SHA512

    dee80ddd2c034c0076c6b340cc6dce3a1e1ae2e0d8217563b7b967d6837543aa5e722d84e64104c569bd1d86908aab11463ed813fc767e67d0ebc82d6016f2fd

  • SSDEEP

    1572864:rvl9Q1l3ISk8IpG7V+VPhqUDE7BHlQonCiYKrhbOoAkTovSKZIgnW5l:rvl92hISkB05awUOHKGrFoxvSKegnW

Malware Config

Targets

    • Target

      RtkAudUService64.exe

    • Size

      74.7MB

    • MD5

      3043c13e74eab4e910dc2a3f2ff9a97d

    • SHA1

      128f6df1a59a97296dd7e95fec3875ea8c0ba0c3

    • SHA256

      3fcdf428a7c2853ade38ee0dc6c4e8ac9598a3e0dff99879fd7524c270c7967c

    • SHA512

      dee80ddd2c034c0076c6b340cc6dce3a1e1ae2e0d8217563b7b967d6837543aa5e722d84e64104c569bd1d86908aab11463ed813fc767e67d0ebc82d6016f2fd

    • SSDEEP

      1572864:rvl9Q1l3ISk8IpG7V+VPhqUDE7BHlQonCiYKrhbOoAkTovSKZIgnW5l:rvl92hISkB05awUOHKGrFoxvSKegnW

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      discord_token_grabber.pyc

    • Size

      8KB

    • MD5

      05b1abcf2b8f1457cee0f078bdbb04f0

    • SHA1

      ce070d54e1d54ffd6c4d96b616f21b7466a062c7

    • SHA256

      2e82faaefa817254cf2a9d5149e3c36c04c3e09aca0bcc1a4e4fa894e137c1b1

    • SHA512

      5af2746296f191af559639b1c5463993e8c4fb25ef945677142a6a02486e6670669eb5a5bdd4c163f1bdd8bd35a7bb8998bbf32e4d0fe9d35db379cf80159a57

    • SSDEEP

      192:iQR8Lslmujbwybyo5HptlYwqJFD7U6r18ZPuNz:vNmcwcpt+D7Ua18uz

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      5KB

    • MD5

      ab0f8084441f8312bffc9d26193967ab

    • SHA1

      82b9c1c9cd1f5a38ac2b415a96c88ce99d27455a

    • SHA256

      6f67d11524ed42b8990be66aed829232514b364746fdceea30e0213204427be4

    • SHA512

      1722dfe7200b5f8fef0cfc4188953621630c7ee8672586490b9309a40512eb7f99fc56ffe52f6a0970809a38e3bdd8ce1862ba6803fe6d09bdfacda1b3fe1732

    • SSDEEP

      96:4Q0jzMv/ppR+xVBcnqhLchLPxrpTkBWeBDFZcj3KldyzoZ:sSZYXPhYhLP12zij3KnyA

    Score
    3/10
    • Target

      misc.pyc

    • Size

      2KB

    • MD5

      5bff7de9304595611b9deeea55076bd3

    • SHA1

      ae5fd2f3fbac4b0587140ab41b30c4d3da286c75

    • SHA256

      39c73d32dce8fe34f56ca6fce56ae54ca99456c49fa04c949a45ca7d8e7355d9

    • SHA512

      4cb8277d8c02380679bcc19ec6cba2dae37b24058116e08cfec30f95a158c1c3b45590c79665ace9abbeda277f1f39be1e806fd90c8dae9a3c44cd69d1157679

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      4KB

    • MD5

      dbd5603fbc95768a5f3f45e6e1f7f109

    • SHA1

      b1fa1a73c1e9e0ee63cccf5a81210a8aa39bf40a

    • SHA256

      657361e158e5b5d76cf2b615d58c7c34de2d06d40f1c049c0757019fadab5e13

    • SHA512

      310aabd4b5ef007faaaac149ea5b182c20eb3db2ea576e1039fc86d8ed5bb7e63b437d10c2c876ab40a0f9f7782dbfc5804d02cf12a0d74d9b1fe5b1a9a035d5

    • SSDEEP

      96:4APDnTWeYwD86gWxS6679kZOyfkoXyWQUUEXtH0lLCvpW1mhs0:FzCUD/S6UyRkpoUEKlLz1m+0

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      64KB

    • MD5

      cdbf9976e0f03a37e2c91d14aa430cec

    • SHA1

      dd7cf8bc5b0c9da43d9a4da7e7a9099e5f073fd7

    • SHA256

      c2f35f61b59d1787201cee4f04dfbe1ca1d9ec5e497afef2b3b026063373e70a

    • SHA512

      f89dc6da1f1598efd371fc772af0eadf772976fce5b6246b3987235eb2f1dcc5bed2ec6dca17e76c7720abe319252f28c2cf39f75197a4c97467b63aed92e19b

    • SSDEEP

      1536:HmBVpSBVqhGjeCBdjxVFH3dBUoHFrICh/:48XHNNVFDUoHtR

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks