Analysis
-
max time kernel
4s -
max time network
7s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 06:12
Static task
static1
1 signatures
General
-
Target
0RMQNB2.vmp.exe
-
Size
12.6MB
-
MD5
11acc6c6ae233255480dc44f28e907d3
-
SHA1
58d7c0925ca9415b60ba0e2968720d1f9463d8b8
-
SHA256
c4e7bcc051993b7478423dda0a744aa005eade7c740bf083f29f430427ee4d14
-
SHA512
f32d9c674daf720f870fbb75909278fc3cf76c83f7c1ecf196c3cbb72dc43cd330159456a202b67cbf164a31f12737519c55068027be3eb024fe4141669a71cc
-
SSDEEP
196608:M5y4n51bzDwrAYIqtmDQy/GpoXzT100wK6KXvU11XaAo:MP5hPaAYI8gQy/GpoXz7/Ujno
Malware Config
Extracted
Family
skuld
C2
https://discord.com/api/webhooks/1278685696588124283/sHga8EVjouFXXrvPxaHU2YXCRJIVE1RYWbSaVSKowDG7Boj-3cTXc-qc4i12g0-7911uD
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0RMQNB2.vmp.exepid process 4916 0RMQNB2.vmp.exe 4916 0RMQNB2.vmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0RMQNB2.vmp.exedescription pid process Token: SeDebugPrivilege 4916 0RMQNB2.vmp.exe