General
Static task
static1
URLScan task
urlscan1
Malware Config
Targets
-
-
Target
https://gofile.io/d/myrNL2
-
Ardamax main executable
-
Detect Blackmoon payload
-
Detect Xworm Payload
-
Gh0st RAT payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Legitimate hosting services abused for malware hosting/C2
-