Overview
overview
10Static
static
38200755cbe...33.exe
windows7-x64
88200755cbe...33.exe
windows10-2004-x64
829c7e87350...5b.exe
windows7-x64
129c7e87350...5b.exe
windows10-2004-x64
349cccd30a5...90.exe
windows7-x64
149cccd30a5...90.exe
windows10-2004-x64
3b17911ddea...82.exe
windows7-x64
1b17911ddea...82.exe
windows10-2004-x64
302ca4397da...51.exe
windows7-x64
302ca4397da...51.exe
windows10-2004-x64
3022aeb126d...74.exe
windows7-x64
9022aeb126d...74.exe
windows10-2004-x64
9smb-7teux2sm.exe
windows7-x64
9smb-7teux2sm.exe
windows10-2004-x64
9smb-onil0o36.exe
windows7-x64
9smb-onil0o36.exe
windows10-2004-x64
9funnies/ma...ab.exe
windows7-x64
10funnies/ma...ab.exe
windows10-2004-x64
10funnies/ma...n.xlsx
windows7-x64
3funnies/ma...n.xlsx
windows10-2004-x64
1General
-
Target
funnies.zip
-
Size
50.6MB
-
Sample
241013-el419aybna
-
MD5
20af42858c3eeb2192424c0aaeac58a3
-
SHA1
4029823a2ef5c60715c72b19a9b612345b05c932
-
SHA256
22d3ebe3ce470c960afed3845fcd99284708aef6416e417b165a9f665b32a70a
-
SHA512
6c28e9d4de0ddc5cfefd006f7a6704fbf0611694d42a248760c96655a8eefc554151142aa1a5b37eb0f5f5e24ef3d0fd4d131415e0121c5971c3bdac981c8878
-
SSDEEP
786432:z/CyLk8/pUZg/JpsPYTBojsdyKDhYbe5u+sjTO+FOOho49+qjfX9gfm3MyNEhQUP:zTvd/JpRdKRz+4S+0x49+QP9Rlfe
Static task
static1
Behavioral task
behavioral1
Sample
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
29c7e87350cb03428fc108b03856095b.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
29c7e87350cb03428fc108b03856095b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
49cccd30a564410d1f9bbce89fa15890.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
49cccd30a564410d1f9bbce89fa15890.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
b17911ddeab973db51362721c940d882.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
b17911ddeab973db51362721c940d882.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
022aeb126d2d80e683f7f2a3ee920874.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
022aeb126d2d80e683f7f2a3ee920874.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
smb-7teux2sm.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
smb-7teux2sm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
smb-onil0o36.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
smb-onil0o36.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
funnies/malware shit/Ransomware/Grandcrab/grandcab.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
funnies/malware shit/Ransomware/Grandcrab/grandcab.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
funnies/malware shit/mitre-attack/Emotet+Trickbot_comparison.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
funnies/malware shit/mitre-attack/Emotet+Trickbot_comparison.xlsx
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.bin
-
Size
1.4MB
-
MD5
f2e1d236c5d2c009e1749fc6479a9ede
-
SHA1
262c22ffd66c33da641558f3da23f7584881a782
-
SHA256
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233
-
SHA512
3b3174ac17e377028accf1ebfd6bd6ae97fc99c4e7814f8ad0fe707dc77d757f26d667333efb495a9b9768d49672737233c88d7a50b4dc81ad170f068ad95cc1
-
SSDEEP
24576:6EpKGrwKydag/jU7IZK8LNmf2+r+eauoUWg6ye2tX9t5WR4MJh:6nGrwKtg7U7I88Zi2/xxyeAt06a
-
Modifies Windows Firewall
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
29c7e87350cb03428fc108b03856095b
-
Size
76KB
-
MD5
29c7e87350cb03428fc108b03856095b
-
SHA1
72980f194cbdc7c0d5944d4858b27e69a2fa0074
-
SHA256
a747fb581c02d1a30f5ed122be58541fd951aa8843e7ab8893755b65ee50ff27
-
SHA512
4849eb02b2bc19cfd85585f1a906d557f97b9bf5ecbb4d94c4e5d5c319d438748cf30fdb1f3d7ff13961c0507243e865be76dc3985ba80fa72e3f5c6ef3cefb0
-
SSDEEP
1536:pv+yNLcKJsJvmIfL8f8vvMHZYyUvBszRu4zLbNf1BnJNP7dcF:dTLHA5fL7vjyU5WBXNf1NjdY
Score3/10 -
-
-
Target
49cccd30a564410d1f9bbce89fa15890.bin
-
Size
49KB
-
MD5
49cccd30a564410d1f9bbce89fa15890
-
SHA1
cc1bfc5f395dcb3241058bec5c656045ee17c944
-
SHA256
2dc0f0286e2fadda2881a1dd767d065493af87c6528e563804fa39e8618bf447
-
SHA512
70a983b5b01227ec9d14cb852d9e5235883dc872420b55999e65f0633b599a106a04f7bc6f0c9ef091858ed334d410f4cdc903425cdedf614bb569a3e4f99398
-
SSDEEP
1536:iTdytmznUkJTbcBPQtXCUP5rKdQz4nBxP5lm:sdy0znnbpDlszC
Score3/10 -
-
-
Target
b17911ddeab973db51362721c940d882
-
Size
76KB
-
MD5
b17911ddeab973db51362721c940d882
-
SHA1
9cc11b7f5eaef6dcbb09bf8af99c24a8292f6a0c
-
SHA256
1515cf2bace264bdecb76a9ac6691084ca5cd77d4d6715b96dc140dddb5c4f8b
-
SHA512
bac484f81ef2edf8900e0ffaf1547cef174b1f471a0e4d2d946a6e5ec2cd207693e42104d55e3ffdda0ce3c03374a9ca04e323bccebc688ddad4074d429802a4
-
SSDEEP
1536:nlPR0uxKlV528faprA64cJdDf/BOHvH2vXKNf1BnJNP7dcF:BRMM8fupdr/ONf1NjdY
Score3/10 -
-
-
Target
02ca4397da55b3175aaa1ad2c99981e792f66151.bin
-
Size
1.5MB
-
MD5
aba2d86ed17f587eb6d57e6c75f64f05
-
SHA1
aeccba64f4dd19033ac2226b4445faac05c88b76
-
SHA256
807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d
-
SHA512
c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806
-
SSDEEP
24576:pWKqa4hnzP3w7L3rmZmpk7FSQFW2iJ+N07/TwYV1CdZdQ+4lT+iFgiGTtswAtdz:pSrwf3aZmpOFU2iQNIUc1LxGTtswgd
Score3/10 -
-
-
Target
022aeb126d2d80e683f7f2a3ee920874.bin
-
Size
64KB
-
MD5
022aeb126d2d80e683f7f2a3ee920874
-
SHA1
b71b6d9af65c6afc4af9d546a330c097aafe3592
-
SHA256
bdd816b9d85947b9bd7f2462d6b177dd6dadfe83723fd4dde4eded130177b218
-
SHA512
e0d818f432431b8b40b303d79526001adc7f71f86a565f2dacb459094f47f3ef1711da8c3cb34d13b2bd91b69542cb079f54af952ac2697778ee2b7c5d087de8
-
SSDEEP
768:2W8+9FisiTZdz4HLCLTRnVuwGiJTPpfl6dW6WsyqAgg8RCW+jl2WDMrL4:2sisiTuLCLTRVuwZp5l/lsyqFg8B+RP
Score9/10-
Contacts a large (10793) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
-
-
Target
smb-7teux2sm.exe
-
Size
56KB
-
MD5
f024ff4176f0036f97ebc95decfd1d5e
-
SHA1
010c623120a373b1a8e6d9339540e0cfe745b574
-
SHA256
7b2f8c43b4c92fb2add9fce264e92668dac2530493c51c5d6b45dcb764e208ed
-
SHA512
d52ddb217f3a6bbaa7bde6c9a268720bf7d055796dafa7687a06533507727a05ec45a0dc08d8b3e3149ddc53bb4f6c1cffce2ce71f80d05b49177a390995fd50
-
SSDEEP
768:1W8+9FisiTNdzkHLCLTXnNuSGgJTPpfl6XWIWsyqA2g8/8WIjl2QDMrL4:1sisiT2LCLT3NuSvp5llTsyqDg8NIRd
Score9/10-
Contacts a large (11426) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
-
-
Target
smb-onil0o36.bin
-
Size
64KB
-
MD5
1877eded2f4a8c06ab480faa42d81969
-
SHA1
848910b3a6fd70e3941a3f0499c73b99c2c79396
-
SHA256
e9068c65d9d42582ea3874bc0a388936dbbe4bc4fc89432db01c0995146c18d2
-
SHA512
605f2d78d5edc809ec201fa5f2096955bd8f7c6adf5b0a0241dce10cb4b89aecd65eed352705a71f191aae3f18d2b371b1a595d0f4ef4ba1c0da4893c25e81ea
-
SSDEEP
768:2W8+9FisiTZdz4HLCLTRnVuwGiJTPpfl6dW6WsyqAgg8RCW+jl2WDMrL4:2sisiTuLCLTRVuwZp5l/lsyqFg8B+RP
Score9/10-
Contacts a large (11436) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
-
-
Target
funnies/malware shit/Ransomware/Grandcrab/grandcab.bin
-
Size
484KB
-
MD5
97a449fed7d800a8a635592605ff8a67
-
SHA1
2f339d8b2edb7c07126d9a3c37effe14966817c5
-
SHA256
233437b647f9482a8a3ba51d0af69039bb58fb48609704a39db1f709a0e6aca6
-
SHA512
85b4b260b801c54927f7b985d5f9fb891e44e5f72f9dcf9656684f8872339480ded94b4f3ba44d71fa491b88243f99155e3ecc7b3005fb5fbe24b1d10f47e4c3
-
SSDEEP
12288:hEm67VkaivvtYku9hoVw7G/znXoABEg6s0u1Tw:dEivv+bGuuznXONq10
Score10/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
funnies/malware shit/mitre-attack/Emotet+Trickbot_comparison.xlsx
-
Size
14KB
-
MD5
248cd700a82449f4b0d107e6a934ae2b
-
SHA1
d1763d827d614ddd6f3ca046ec6d1cf880f4dc25
-
SHA256
6ff88255226a7f0de338e8383904a6fd8af5eb630c28ae6846b107de41fa22ef
-
SHA512
c5755cc015b3e6aa30ce1c87c05a7712fc7939f57d7d470025a50c8d280ad53d97701f34b85b8f9300652989720915ccac28a22925e73ea48455116f37c31746
-
SSDEEP
384:YlbZERmunyjfOOTXC6ACMYMx3pF5dBwDVfJZKTvazDpzQ:OdunyXXC6jzqTKVxZ7zDC
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1