Overview
overview
7Static
static
3VX CHAOS F...es.url
windows7-x64
1VX CHAOS F...es.url
windows10-2004-x64
1packers/Ex...th.exe
windows7-x64
3packers/Ex...th.exe
windows10-2004-x64
3ExeS.exe
windows7-x64
5ExeS.exe
windows10-2004-x64
3UPX/uninstall.exe
windows7-x64
7UPX/uninstall.exe
windows10-2004-x64
7UPX/upx.vbs
windows7-x64
1UPX/upx.vbs
windows10-2004-x64
1UPX/upx.exe
windows7-x64
3UPX/upx.exe
windows10-2004-x64
3UPX/upx.html
windows7-x64
3UPX/upx.html
windows10-2004-x64
3morphine.js
windows7-x64
3morphine.js
windows10-2004-x64
3morphine.exe
windows7-x64
1morphine.exe
windows10-2004-x64
3packers/Packman.exe
windows7-x64
3packers/Packman.exe
windows10-2004-x64
3packers/Sc...ol.exe
windows7-x64
1packers/Sc...ol.exe
windows10-2004-x64
3packers/wup.exe
windows7-x64
3packers/wup.exe
windows10-2004-x64
3packers/yP.exe
windows7-x64
3packers/yP.exe
windows10-2004-x64
3source/cpp/misc.vbs
windows7-x64
1source/cpp/misc.vbs
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
VX CHAOS FILE SERVER - Virii, Worms, Anti-Virus, Hacker Tools, Warez, Codes.url
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VX CHAOS FILE SERVER - Virii, Worms, Anti-Virus, Hacker Tools, Warez, Codes.url
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
packers/ExeStealth.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
packers/ExeStealth.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
ExeS.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
ExeS.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
UPX/uninstall.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
UPX/uninstall.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
UPX/upx.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
UPX/upx.vbs
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
UPX/upx.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
UPX/upx.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
UPX/upx.html
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
UPX/upx.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
morphine.js
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
morphine.js
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
morphine.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
morphine.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
packers/Packman.exe
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
packers/Packman.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
packers/Scramble-Tool.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
packers/Scramble-Tool.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
packers/wup.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
packers/wup.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral25
Sample
packers/yP.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
packers/yP.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
source/cpp/misc.vbs
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
source/cpp/misc.vbs
Resource
win10v2004-20240802-en
General
-
Target
efa80942b5e57a63ae74708268442e54_JaffaCakes118
-
Size
1.1MB
-
MD5
efa80942b5e57a63ae74708268442e54
-
SHA1
ba567fa91a0baa2cbcff10e16ec502354c04a0a9
-
SHA256
3042f118cb5ad7bf63e162a53ffa385c234c9cc2f3cb99573f24d03561aff566
-
SHA512
2ce006bbd391847e3c7d912b8fd7ce00796db8b0184107cef9af91a01ece7e0f5d095f163094ce9779589059048a73ec37edebf40a1a259f01a7103343182402
-
SSDEEP
24576:1nYGKvSA9xo0pmJdwAbjbk/GRAJ0bUiOgmLW2jZqQJIPJo:1ZKF9xo0YLwKvLRbUVgmy2L4Jo
Malware Config
Signatures
-
Unsigned PE 9 IoCs
Checks for missing Authenticode signature.
resource unpack001/packers/ExeStealth.exe unpack002/ExeS.exe unpack002/UPX/uninstall.exe unpack002/UPX/upx.exe unpack002/morphine.exe unpack001/packers/Packman.exe unpack001/packers/Scramble-Tool.exe unpack001/packers/wup.exe unpack001/packers/yP.exe
Files
-
efa80942b5e57a63ae74708268442e54_JaffaCakes118.rar
-
VX CHAOS FILE SERVER - Virii, Worms, Anti-Virus, Hacker Tools, Warez, Codes.url
-
VX CHAOS.nfo
-
VX CHAOS.txt
-
docs/cmds.txt
-
packers/ExeStealth.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 18KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
English.lng
-
ExeS.dof
-
ExeS.dpr
-
ExeS.exe.exe windows:1 windows x86 arch:x86
d31c3d3bdbc37da0c1d51b2dea6b6966
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
user32
GetKeyboardType
advapi32
RegQueryValueExA
oleaut32
VariantChangeTypeEx
gdi32
UnrealizeObject
ole32
IsEqualGUID
comctl32
ImageList_SetIconSize
shell32
ShellExecuteExA
comdlg32
GetSaveFileNameA
Sections
CODE Size: 133KB - Virtual size: 388KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
ExeS.res
-
German.lng
-
History.txt
-
License.txt
-
UPX/BUGS
-
UPX/COPYING
-
UPX/LICENSE
-
UPX/NEWS
-
UPX/README
-
UPX/THANKS
-
UPX/uninstall.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 18KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
UPX/upx.doc.vbs
-
UPX/upx.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
.text Size: 112KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
UPX/upx.html.html .vbs polyglot
-
Unit1.dfm
-
Unit1.pas
-
Unit2.dfm
-
Unit2.pas
-
morphine.dpr.js
-
morphine.exe.exe windows:4 windows x86 arch:x86
09d0478591d4f788cb3e5ea416c25237
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
Sections
CODE Size: 21KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
morphine.txt
-
winxp.RES
-
packers/Packman.exe.exe windows:4 windows x86 arch:x86
eaf478c5ed68a66331acd2c65b312a62
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
comctl32
ord17
shlwapi
PathCompactPathA
user32
GetDC
gdi32
DeleteDC
comdlg32
GetSaveFileNameA
shell32
DragFinish
Sections
.PACKMAN Size: - Virtual size: 48KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.PACKMAN Size: 28KB - Virtual size: 28KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
packers/Scramble-Tool.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
code Size: - Virtual size: 192KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
text Size: 351KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
packers/wup.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.Upack Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
packers/yP.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 72KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yP Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
source/cfg/conf.h
-
source/cpp/advscan.cpp
-
source/cpp/aliaslog.cpp
-
source/cpp/autostart.cpp
-
source/cpp/avirus.cpp
-
source/cpp/bindshell.cpp
-
source/cpp/capture.cpp
-
source/cpp/cdkeys.cpp
-
source/cpp/clsass.cpp
-
source/cpp/crc32.cpp
-
source/cpp/crypt.cpp
-
source/cpp/dcass.cpp
-
source/cpp/dcc.cpp
-
source/cpp/dcom.cpp
-
source/cpp/ddos.cpp
-
source/cpp/download.cpp
-
source/cpp/driveinfo.cpp
-
source/cpp/ehandler.cpp
-
source/cpp/findfile.cpp
-
source/cpp/findpass.cpp
-
source/cpp/fphost.cpp
-
source/cpp/ftpd.cpp
-
source/cpp/httpd.cpp
-
source/cpp/icmpflood.cpp
-
source/cpp/ident.cpp
-
source/cpp/irc_send.cpp
-
source/cpp/keylogger.cpp
-
source/cpp/loaddlls.cpp
-
source/cpp/lsass.cpp
-
source/cpp/lsass1lsass.cpp
-
source/cpp/misc.cpp.vbs
-
source/cpp/mssql.cpp
-
source/cpp/mssqllsass.cpp
-
source/cpp/ndcass.cpp
-
source/cpp/net.cpp
-
source/cpp/netbios.cpp
-
source/cpp/netutils.cpp
-
source/cpp/peer2peer.cpp
-
source/cpp/pingudp.cpp
-
source/cpp/processes.cpp
-
source/cpp/psniff.cpp
-
source/cpp/random.cpp
-
source/cpp/realcast.cpp
-
source/cpp/redirect.cpp
-
source/cpp/remotecmd.cpp
-
source/cpp/rlogind.cpp
-
source/cpp/rndnick.cpp
-
source/cpp/scan.cpp
-
source/cpp/secure.cpp
-
source/cpp/session.cpp
-
source/cpp/shellcode.cpp
-
source/cpp/socks4.cpp
-
source/cpp/synflood.cpp
-
source/cpp/sysinfo.cpp
-
source/cpp/tcpflood.cpp
-
source/cpp/tcpflood2.cpp
-
source/cpp/tftpd.cpp
-
source/cpp/threads.cpp
-
source/cpp/visit.cpp
-
source/cpp/wildcard.cpp
-
source/cpp/wksmass.cpp
-
source/cpp/wkssvc.cpp
-
source/cpp/xerion.cpp
-
source/h/advscan.h
-
source/h/aliaslog.h
-
source/h/autostart.h
-
source/h/avirus.h
-
source/h/capture.h
-
source/h/cdkeys.h
-
source/h/clsass.h
-
source/h/crc32.h
-
source/h/crypt.h
-
source/h/dcass.h
-
source/h/dcc.h
-
source/h/dcom.h
-
source/h/ddos.h
-
source/h/defines.h
-
source/h/download.h
-
source/h/driveinfo.h
-
source/h/ehandler.h
-
source/h/externs.h
-
source/h/findfile.h
-
source/h/findpass.h
-
source/h/fphost.h
-
source/h/ftpd.h
-
source/h/ftppot.h
-
source/h/functions.h
-
source/h/globals.h
-
source/h/httpd.h
-
source/h/icmpflood.h
-
source/h/ident.h
-
source/h/includes.h
-
source/h/irc_send.h
-
source/h/keylogger.h
-
source/h/loaddlls.h
-
source/h/lsass.h
-
source/h/lsass1lsass.h
-
source/h/lsass2.h
-
source/h/misc.h
-
source/h/mssql.h
-
source/h/mssqllsass.h
-
source/h/ndcass.h
-
source/h/net.h
-
source/h/netbios.h
-
source/h/netutils.h
-
source/h/nicklist.h
-
source/h/passwd.h
-
source/h/peer2peer.h
-
source/h/pingudp.h
-
source/h/processes.h
-
source/h/psniff.h
-
source/h/random.h
-
source/h/realcast.h
-
source/h/redirect.h
-
source/h/remotecmd.h
-
source/h/rlogind.h
-
source/h/rndnick.h
-
source/h/scan.h
-
source/h/secure.h
-
source/h/session.h
-
source/h/shares.h
-
source/h/shellcode.h
-
source/h/socks4.h
-
source/h/synflood.h
-
source/h/sysinfo.h
-
source/h/tcpflood.h
-
source/h/tcpflood2.h
-
source/h/tcpip.h
-
source/h/tftpd.h
-
source/h/threads.h
-
source/h/visit.h
-
source/h/wildcard.h
-
source/h/wksmass.h
-
source/h/wkssvc.h
-
source/h/xerion.h
-
vxchaos or die.jpg.jpg
-
xerion.dsp
-
xerion.dsw