Analysis
-
max time kernel
0s -
max time network
2s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 17:34
Static task
static1
collection credential_access defense_evasion discovery execution persistence privilege_escalaiton spyware stealer upxblankgrabber
2 signatures
Behavioral task
behavioral1
Sample
xniggerskid.pyc
Resource
win7-20240708-en
windows7-x64
3 signatures
1 seconds
Behavioral task
behavioral2
Sample
xniggerskid.pyc
Resource
win10v2004-20241007-en
windows10-2004-x64
2 signatures
1 seconds
General
-
Target
xniggerskid.pyc
-
Size
261B
-
MD5
8b8d984971b306d45206ee86ff411741
-
SHA1
859b9fdaea8933b3407a51ae3c1fedb13c29f257
-
SHA256
e848e89a75f49e51365a4be66cf58ab737c7ad216d10afdb8ac7c25f2e8bbfde
-
SHA512
ebae5717f6e7162a834c1da31e879ca98a23dc6ccf017679d0512b8c59f23c885a0209b9dc22c78bd3b9d3c248536c39a180c42e3d0f5f3369015c4fedd35008
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe