General
-
Target
x.exe
-
Size
11.6MB
-
Sample
241004-r4yneateqh
-
MD5
db34e85e25da2e5b3b8ff777bbb68e4c
-
SHA1
7c0e50f60c6470e0b8b6bedd89e4fe7f85df52cf
-
SHA256
9382ff9b4e5ed4b170c306526dad14d4b3fc8d2f0e0c3f7febd6fa3e9d797adf
-
SHA512
35053bb9f51f7f9f166e3f41cedd663e6a7733cb78f9236282177d8b9d986239c26fca5db9a5a95c0cbf05bfdd78769f63dc698a2e05cde52f3dc7197b51170e
-
SSDEEP
196608:/B7v86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6lM8Qnf2ODjMnGydScSEPVrBO8:tWV9hZ2YsHFUK2JAdQJlsF3MnG3tOVr5
Behavioral task
behavioral1
Sample
x.exe
Resource
win11-20240802-en
Malware Config
Extracted
berbew
http://crutop.nu/index.php
http://crutop.ru/index.php
http://mazafaka.ru/index.php
http://color-bank.ru/index.php
http://asechka.ru/index.php
http://trojan.ru/index.php
http://fuck.ru/index.php
http://goldensand.ru/index.php
http://filesearch.ru/index.php
http://devx.nm.ru/index.php
http://ros-neftbank.ru/index.php
http://lovingod.host.sk/index.php
http://www.redline.ru/index.php
http://cvv.ru/index.php
http://hackers.lv/index.php
http://fethard.biz/index.php
http://ldark.nm.ru/index.htm
http://gaz-prom.ru/index.htm
http://promo.ru/index.htm
http://potleaf.chat.ru/index.htm
http://kadet.ru/index.htm
http://cvv.ru/index.htm
http://crutop.nu/index.htm
http://crutop.ru/index.htm
http://mazafaka.ru/index.htm
http://xware.cjb.net/index.htm
http://konfiskat.org/index.htm
http://parex-bank.ru/index.htm
http://kidos-bank.ru/index.htm
http://kavkaz.ru/index.htm
http://fethard.biz/index.htm
http://tat-neftbank.ru/kkq.php
http://tat-neftbank.ru/wcmd.htm
http://viruslist.com/wcmd.txt
http://viruslist.com/ppslog.php
http://viruslist.com/piplog.php?%s:%i:%i:%s:%09u:%i:%02d:%02d:%02d
Targets
-
-
Target
x.exe
-
Size
11.6MB
-
MD5
db34e85e25da2e5b3b8ff777bbb68e4c
-
SHA1
7c0e50f60c6470e0b8b6bedd89e4fe7f85df52cf
-
SHA256
9382ff9b4e5ed4b170c306526dad14d4b3fc8d2f0e0c3f7febd6fa3e9d797adf
-
SHA512
35053bb9f51f7f9f166e3f41cedd663e6a7733cb78f9236282177d8b9d986239c26fca5db9a5a95c0cbf05bfdd78769f63dc698a2e05cde52f3dc7197b51170e
-
SSDEEP
196608:/B7v86gV1rbQQOOl2szsHFUK2r7UyTAdQmR8dA6lM8Qnf2ODjMnGydScSEPVrBO8:tWV9hZ2YsHFUK2JAdQJlsF3MnG3tOVr5
-
Ardamax main executable
-
Cobalt Strike reflective loader
Detects the reflective loader used by Cobalt Strike.
-
Detect Blackmoon payload
-
Gh0st RAT payload
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Detects Floxif payload
-
ModiLoader Second Stage
-
Modifies Windows Firewall
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Uses the VBS compiler for execution
-
Indicator Removal: File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Obfuscated Files or Information
1Command Obfuscation
1System Binary Proxy Execution
1Verclsid
1