Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
19-09-2024 16:46
Behavioral task
behavioral1
Sample
release.zip
Resource
win10-20240404-en
windows10-1703-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Release/Discord rat.exe
Resource
win10-20240404-en
windows10-1703-x64
2 signatures
150 seconds
Behavioral task
behavioral3
Sample
builder.exe
Resource
win10-20240404-en
windows10-1703-x64
1 signatures
150 seconds
Behavioral task
behavioral4
Sample
dnlib.dll
Resource
win10-20240404-en
windows10-1703-x64
0 signatures
150 seconds
Behavioral task
behavioral5
Sample
token.txt
Resource
win10-20240404-en
windows10-1703-x64
2 signatures
150 seconds
General
-
Target
token.txt
-
Size
95B
-
MD5
ccf567d6f7cddda5ca716ce09c0c83be
-
SHA1
fd4601aacc2cafa14d67f38a93d52badf0b391c3
-
SHA256
b138f5fa47b8c66511e4f9293c04c370a1b8ea6d596adb6cbc13b8e29918bbec
-
SHA512
f52ab05b1cd3744cd40f4d62fe3775d8afca39f46228aa410a800742a268a575d2c2ceff47f20e2a0d5080b54d3c67b657c320a840a390063c81713f5ada4066
Score
1/10
Malware Config
Signatures
-
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 5000 NOTEPAD.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5000 NOTEPAD.EXE