General
-
Target
start_yara.exee
-
Size
4.6MB
-
Sample
240910-j1bepstdmj
-
MD5
90bacba6d4a481397d3a759f06bf7271
-
SHA1
bf0c904a0d72981e51ff575272203c03c8e3327a
-
SHA256
bf2a11710eb16103afbcb200979c9a6de040a9b6d5e77bde5d6a93b5837aa6f1
-
SHA512
a6582bf8132cd1c3aba5a345e1fb79c255f187b6e68d7ea0dc0c34bd8596ac1462cf97beb5716ef5fd85f09436e61b1c2b03f690f9e7198d8666a3b03c9e4ad7
-
SSDEEP
98304:VllLJqs6/is/bhFAf5lx7pll23uog6rbre/Zs/z1rzN:VlusXs/bhC17HzD66xs/z1rB
Static task
static1
Malware Config
Targets
-
-
Target
start_yara.exee
-
Size
4.6MB
-
MD5
90bacba6d4a481397d3a759f06bf7271
-
SHA1
bf0c904a0d72981e51ff575272203c03c8e3327a
-
SHA256
bf2a11710eb16103afbcb200979c9a6de040a9b6d5e77bde5d6a93b5837aa6f1
-
SHA512
a6582bf8132cd1c3aba5a345e1fb79c255f187b6e68d7ea0dc0c34bd8596ac1462cf97beb5716ef5fd85f09436e61b1c2b03f690f9e7198d8666a3b03c9e4ad7
-
SSDEEP
98304:VllLJqs6/is/bhFAf5lx7pll23uog6rbre/Zs/z1rzN:VlusXs/bhC17HzD66xs/z1rB
-
Cobalt Strike reflective loader
Detects the reflective loader used by Cobalt Strike.
-
Industroyer
Also known as CrashOverride. Malware framework which targets Industrial Control Systems (ICS) related to power transmission.
-
Industroyer IEC-104 Module
Contains strings related to Industroyer module used to communicate with power transmission grids over IEC-104 protocol.
-
Merlin payload
-
NetFilter payload
-
NetWire RAT payload
-
Snake Keylogger payload
-
Executes dropped EXE
-
Loads dropped DLL
-