General
-
Target
Z-Launcher-GPS5-Crack.exe
-
Size
7.5MB
-
Sample
240925-x7yqgawhjb
-
MD5
3df8c50e5ff81bdb6950b37ae3937e74
-
SHA1
4c84556c3f4e1b1d2dbc65f2e74374d4839a085e
-
SHA256
549f42781fac652ef7934675b018bf5536df71ad399b3bb87d3174a9bc310d9e
-
SHA512
ea565f36f68647cd48f65ed07d21963457f1f29e867a3671b53a2ac2448d94e4d8675c9fb768c4c08cce11bc3ffe562bd481b79eef7b6a5a664a185f5601f2fa
-
SSDEEP
196608:fBXOP9VgurErvI9pWjgfPvzm6gsFE14Au:ZeluurEUWjC3zDb04Au
Behavioral task
behavioral1
Sample
Z-Launcher-GPS5-Crack.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Z-Launcher-GPS5-Crack.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
Z-Launcher-GPS5-Crack.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
Z-Launcher-GPS5-Crack.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
śG[��.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
śG[��.pyc
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
śG[��.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral8
Sample
śG[��.pyc
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Z-Launcher-GPS5-Crack.exe
-
Size
7.5MB
-
MD5
3df8c50e5ff81bdb6950b37ae3937e74
-
SHA1
4c84556c3f4e1b1d2dbc65f2e74374d4839a085e
-
SHA256
549f42781fac652ef7934675b018bf5536df71ad399b3bb87d3174a9bc310d9e
-
SHA512
ea565f36f68647cd48f65ed07d21963457f1f29e867a3671b53a2ac2448d94e4d8675c9fb768c4c08cce11bc3ffe562bd481b79eef7b6a5a664a185f5601f2fa
-
SSDEEP
196608:fBXOP9VgurErvI9pWjgfPvzm6gsFE14Au:ZeluurEUWjC3zDb04Au
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
śG[��.pyc
-
Size
1KB
-
MD5
9a1b0ba490e40ed466e95560b4e9a04e
-
SHA1
1ac17bc3ccc522eecdacf8bc17ebb0da47258f7c
-
SHA256
e98a6358fd559c1812b33a8f20b293ab4804e32a8cb83c6f950d65911f1be840
-
SHA512
1cf8d4fb7e7e711cd455ae00217409a85ece5051ccfee0e629bb2210eeb19e18f21bc6e931fdc2b207de42bb9d71f736a87ea468055d3819ee112fdcf57dae31
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3