General

  • Target

    1e3017bb3b0b56f90b89106d7dc6c9f7e1917be0efd83b88192c2bd6f76ab94f

  • Size

    17.3MB

  • MD5

    fe415829a50e7f63707dc46ab5de1e99

  • SHA1

    5b1930923b0c29c31709139ed53f7f9572ec0eb6

  • SHA256

    1e3017bb3b0b56f90b89106d7dc6c9f7e1917be0efd83b88192c2bd6f76ab94f

  • SHA512

    4e5b6d2dbcac46abecd5cd4fbf978a9f062aef5c7c6c07b6c699c7d9ec64ac5c6aa86232a812ab871805a8990a1d462442929b89e30b09c20fddd36d2790350d

  • SSDEEP

    196608:kD6FuwYCfKuBEq9SF+q4s1JR/qRQwixa8slecKMspanCM+Jmp+HE0IFAxbXsy+Kw:aEz

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Gcleaner family
  • HelloKitty ELF 1 IoCs
  • Hellokitty family
  • Industroyer IEC-104 Module 1 IoCs

    Contains strings related to Industroyer module used to communicate with power transmission grids over IEC-104 protocol.

  • Industroyer family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Merlin family
  • Merlin payload 1 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Modiloader family
  • Mountlocker family
  • NetFilter payload 1 IoCs
  • NetWire RAT payload 1 IoCs
  • Netfilter family
  • Netwire family
  • Remcos family
  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • 1e3017bb3b0b56f90b89106d7dc6c9f7e1917be0efd83b88192c2bd6f76ab94f