Analysis

  • max time kernel
    15s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    18/09/2024, 22:03

General

  • Target

    Trojan.Win32.Zombie.exe

  • Size

    146KB

  • MD5

    ad3b868d11bf969e6517f4fadc4e0070

  • SHA1

    0dbaa829a65bbb42c336f3764849dddee07c1aec

  • SHA256

    e928f4fd5012de21f72ebbcd1351d91b8861ffe8a5729f8bcdefb4897b916c0f

  • SHA512

    f3181472e447547a3b1ef89f669925332940973e8c2b3d1412de2a67756692262a476be12aa5501233dc175d1ea488bbf2f2ba2340bece25826a7e58bf124758

  • SSDEEP

    1536:W7ZppApBULcfpHLcfpX2/Nw/Nwmxmw1w3CQCCIcEhNwNFkNXNFpiFu9Fy2XNgNFe:6pWpBwchcV2Wxmw1w3W+0JO2XKFbd0B

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe
    "C:\Users\Admin\AppData\Local\Temp\Trojan.Win32.Zombie.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2192

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads