Overview
overview
9Static
static
7Defender_Settings.vbs
windows7-x64
1Defender_Settings.vbs
windows10-2004-x64
1dControl.exe
windows7-x64
7dControl.exe
windows10-2004-x64
7Flexlm/RLM...er.exe
windows7-x64
9Flexlm/RLM...er.exe
windows10-2004-x64
9Flexlm/RLM...de.dll
windows7-x64
1Flexlm/RLM...de.dll
windows10-2004-x64
1Flexlm/RLM...ft.bat
windows7-x64
5Flexlm/RLM...ft.bat
windows10-2004-x64
5Flexlm/RLM...ft.bat
windows7-x64
8Flexlm/RLM...ft.bat
windows10-2004-x64
8block-network.bat
windows7-x64
1block-network.bat
windows10-2004-x64
1clean-befo...ll.bat
windows7-x64
8clean-befo...ll.bat
windows10-2004-x64
8exe/VC.dll
windows7-x64
1exe/VC.dll
windows10-2004-x64
1exe/VCRUNTIME140.dll
windows7-x64
9exe/VCRUNTIME140.dll
windows10-2004-x64
9exe/version.dll
windows7-x64
9exe/version.dll
windows10-2004-x64
9prs/version.dll
windows7-x64
9prs/version.dll
windows10-2004-x64
9General
-
Target
crack.zip
-
Size
22.9MB
-
Sample
240914-h6pzlssgna
-
MD5
9ba83e0b8e55bf950de08bf9cfe0d2f2
-
SHA1
a982b4dcc1a197aad9e81a22aa13212e18e9202b
-
SHA256
15082d63b8d260ab182000b054b43679961bb1086ea8fdfdd53833e6148b3c55
-
SHA512
9e37678ad1161709e0ad22d49a6f548579f87c6e83fb43aaa1c8e101f1c949a680a79261969658aa81d1a6ef2843d2a6df3f3aa16184d95e19853c4a716733e1
-
SSDEEP
393216:uuBv7rsGjaaMNWdz1AXCLH2RB1R4spIYlWuijCpz/P0KLiGgsU:jBfZjzjdz1KCLHq1R4spdWYprpLiHZ
Behavioral task
behavioral1
Sample
Defender_Settings.vbs
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Defender_Settings.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
dControl.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
dControl.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Flexlm/RLM_Redshift_LicServer/CGHotman_Redshift_Server.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Flexlm/RLM_Redshift_LicServer/CGHotman_Redshift_Server.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Flexlm/RLM_Redshift_LicServer/PatchCode.dll
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Flexlm/RLM_Redshift_LicServer/PatchCode.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral9
Sample
Flexlm/RLM_Redshift_LicServer/start_rlm_Redshift.bat
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Flexlm/RLM_Redshift_LicServer/start_rlm_Redshift.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Flexlm/RLM_Redshift_LicServer/stop_rlm_Redshift.bat
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Flexlm/RLM_Redshift_LicServer/stop_rlm_Redshift.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
block-network.bat
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
block-network.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
clean-before-install.bat
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
clean-before-install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
exe/VC.dll
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
exe/VC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
exe/VCRUNTIME140.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
exe/VCRUNTIME140.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
exe/version.dll
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
exe/version.dll
Resource
win10v2004-20240910-en
Behavioral task
behavioral23
Sample
prs/version.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
prs/version.dll
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Defender_Settings.vbs
-
Size
313B
-
MD5
b0bf0a477bcca312021177572311e666
-
SHA1
ea77332d7779938ae8e92ad35d6dea4f4be37a92
-
SHA256
af42a17d428c8e9d6f4a6d3393ec268f4d12bbfd01a897d87275482a45c847e9
-
SHA512
09366608f2670d2eb0e8ddcacd081a7b2d7b680c4cdd02494d08821dbdf17595b30e88f6ce0888591592e7caa422414a895846a268fd63e8243074972c9f52d8
Score1/10 -
-
-
Target
dControl.exe
-
Size
447KB
-
MD5
58008524a6473bdf86c1040a9a9e39c3
-
SHA1
cb704d2e8df80fd3500a5b817966dc262d80ddb8
-
SHA256
1ef6c1a4dfdc39b63bfe650ca81ab89510de6c0d3d7c608ac5be80033e559326
-
SHA512
8cf492584303523bf6cdfeb6b1b779ee44471c91e759ce32fd4849547b6245d4ed86af5b38d1c6979729a77f312ba91c48207a332ae1589a6e25de67ffb96c31
-
SSDEEP
6144:Vzv+kSn74iCmfianQGDM3OXTWRDy9GYQDUmJFXIXHrsUBnBTF8JJCYrYNsQJzfgu:Vzcn7EanlQiWtYhmJFSwUBLcQZfgiD
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
Flexlm/RLM_Redshift_LicServer/CGHotman_Redshift_Server.exe
-
Size
7.7MB
-
MD5
b0d6ae3bae0ecf922835e88f0d2651f2
-
SHA1
ca62d67d5eeec91bd5d7b683198af9b5c3afe396
-
SHA256
802ff85804d2980c56a008faaf630d43fbabd1cf3926d154189fb482d9e64948
-
SHA512
26fc0a5e5fa3e1849afc4090cb74edb712f72a12495026d3d90d4d75190ce153d340c63d3ee57c32fa5810637d8598442de240c9e27a3f149c8d7fcfcac0c87a
-
SSDEEP
196608:1s17JSE4L3c0+njos7ZnAz6J7Cul06xy1QpwoYdj:15nojbZnyuplBw15Ddj
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Flexlm/RLM_Redshift_LicServer/PatchCode.dll
-
Size
352KB
-
MD5
6f4d1ca799db5b697020b766cb4e7e0c
-
SHA1
990c3115d2735e21372172bc68582942baa345fd
-
SHA256
ba6bf08993a7af731350c033f0d8baef60cbf1be1dc7b5470ffc94346694d3f5
-
SHA512
d8c5de383d5fd458313b0d7dc90dfae058c31cac2c082e3f59b7aee68d03b7d6bd97eab461aa553d796e7b598f7fd4cca18d217f38f7182b2e06b1b705bb6045
-
SSDEEP
6144:h19DH6EvbWViXhlDMRbFiM1JtwXJNZrxwcjWcNOR3dSk:BDH60bWViXhlyFiMntjc
Score1/10 -
-
-
Target
Flexlm/RLM_Redshift_LicServer/start_rlm_Redshift.bat
-
Size
980B
-
MD5
25300a269b8dd5c89876495ef98088cb
-
SHA1
0131acd6ef015b165b29dd3bf488011eae74dc8f
-
SHA256
0920c2445e2af510161894d000726dc9e0dc2b1df90bc10184fd09a92eb68ec9
-
SHA512
4ad63a12be7f235d0991844ddd125bc2001e7a6bb66daa2205676a49a8c5d9d904e49526da4a53bf341a1a98fd5895eb3e6bd51309e1b79ac0d504fa19c0eb71
Score5/10-
Enumerates processes with tasklist
-
-
-
Target
Flexlm/RLM_Redshift_LicServer/stop_rlm_Redshift.bat
-
Size
871B
-
MD5
dd42a41304b17ecffaed8c5c41a425cc
-
SHA1
08facc23eb93a58b816384533e4c16c975bdeabd
-
SHA256
ecd34db7e7aff5aa843f048b64f76ad19c4123d6d77616855a8613eb0c111458
-
SHA512
ca8c16242aed2b842d6e7859109d4ea5c9efb435773af0b52304f9531274f57b50883ea6950e2672ec5fc3dd3f7503f57e04d21122b5417d3e6a7e398245bfd9
-
Enumerates processes with tasklist
-
-
-
Target
block-network.bat
-
Size
1KB
-
MD5
138e11a6ce35f64ce29c50bcbf2ccda6
-
SHA1
6350bc57b36c94e6d02738465bcd487d5e28876b
-
SHA256
63489de63aec61f65ccad8bff5c7909b6a07838b47169681512558d4d3685c15
-
SHA512
e68f596ae7edbb3e839f2f0752289c546e9cf3511eb771c08d2d3ca4de8a46c91439805e611ffaf32d545847a9607be725bd0a11cfd3861a7d3f304e3e7edde0
Score1/10 -
-
-
Target
clean-before-install.bat
-
Size
579B
-
MD5
5a3a73772412245ee7bed6122d8dec42
-
SHA1
cd26b631afff5bce55a3d6c0b864855d03c44eb6
-
SHA256
8902569579c5125ca8da3ea157729c01b246bfef7b727bdb0dbc1d85695e6c53
-
SHA512
9a7c65750ec55b63b471e55584c051327402bd3008afcb9e7f6ed7af036b05f835ba249cfa269c3233f57f61338db66d6c85726dc87aa27338ef483b3a473070
-
-
-
Target
exe/VC.dll
-
Size
352KB
-
MD5
912f9472b0a8c5d467c5c35d9fc4887d
-
SHA1
77c59f71674726fed7619f0e9aff7cc3bab2ded6
-
SHA256
daea44d2a2c4aabfc74d88e2eee1a40c77057606d2a8341ca7670ed6e1a77068
-
SHA512
86ff9149f210d7d5c070523e55fed022b8e98e8871b7dba18ffa5a136b3daae8cb3724897ddfd6af6f31c3b6a4126439d142b39046e920f9b53c1aab16c8c7f2
-
SSDEEP
6144:2w/rPlhctwa6iXh0cM04cEI+NcYSLyAOrhwcjMMGmYIrEUEa:brPlWtwtiXh0uBEI+eYSJMa
Score1/10 -
-
-
Target
exe/VCRUNTIME140.dll
-
Size
5.3MB
-
MD5
73dc0eb11eb9eb17e48d1f0b2828c4d3
-
SHA1
d5008d174c12b8a7d3c0d566296e964b61959383
-
SHA256
3dd18e207c2dcc3e48a678eaf1ef498043d3abc6bad02c17ea16d6fc4f6c25f8
-
SHA512
8b76223f8b2369b72cb96dbf852335663d7e110771d148dfca2ce828d18b6e76a44a127a52f6a4cea6948d0d51624b1771837c170b6404e844bc46034fe6fa6c
-
SSDEEP
98304:QkulTNF7ipgtYfJTCv23Az5NJZYr8UUmUtkume7al7/X6wasDiaqfq:nGNdAgufJTCv23KrQrWml7+sGaF
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
exe/version.dll
-
Size
5.1MB
-
MD5
5e9ff92f32c567e00a501c194f6aa507
-
SHA1
e7bb3dfb31cf8e9cd48de558b648b3868ab63269
-
SHA256
4f7c6ba05f9c2d4b847e898dd5eb33004a9dde0782d17b182768d301ff5d06a9
-
SHA512
2edd2b1f66a01663e67570c546e72872f70a995f9dcd27d9619258023400bbaa6b15f41dd48601e08572c0aeac1cd3f0eeb5fd7a3832e1dcd6af6acb889b0720
-
SSDEEP
98304:N8isYLlc4EqtHscSK5hilPNyEbeGV34tyAg3HuW+j3svi7EqPldcI9hY:6isYC9qtMYaPFbey34tyvr+j8axldcI9
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
prs/version.dll
-
Size
4.3MB
-
MD5
8a2fc7ebc76da1e8678935f5f4a44ed7
-
SHA1
b48c739c9ccdfa2754debc6eaf43b9604891725e
-
SHA256
8ad2ddc42e5f00c1a88193ad89c1cc65fca983122d705155534154601c9ce28e
-
SHA512
6f5afab2261d9078a6f809f8bf40799fed4136cb33a96138efabc704dba140348542c29d2a2ed128cba7ecb5b0d0de138031c9d76a54c651599a66edd6c58825
-
SSDEEP
98304:iIlGfN1CcHe3M6GeQRqIajWggLdWSor0dflm9Qx3g5wwaW5xe6jL:hlGfDCYe3M6usIWWfvoriflAQxQdaWzL
Score9/10-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Defense Evasion
Impair Defenses
1Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1