Overview
overview
10Static
static
10testingflr...RV.jar
windows7-x64
1testingflr...RV.jar
windows10-2004-x64
1testingflr...02.jar
windows7-x64
1testingflr...02.jar
windows10-2004-x64
1testingflr...98.jar
windows7-x64
1testingflr...98.jar
windows10-2004-x64
1testingflr....5.jar
windows7-x64
1testingflr....5.jar
windows10-2004-x64
1testingflr...lt.jar
windows7-x64
1testingflr...lt.jar
windows10-2004-x64
1testingflr...et.exe
windows7-x64
8testingflr...et.exe
windows10-2004-x64
8testingflr...r1.exe
windows7-x64
10testingflr...r1.exe
windows10-2004-x64
10testingflr...ns.jar
windows7-x64
1testingflr...ns.jar
windows10-2004-x64
1testingflr...ter.sh
windows7-x64
3testingflr...ter.sh
windows10-2004-x64
3testingflr...ka.exe
windows7-x64
8testingflr...ka.exe
windows10-2004-x64
8General
-
Target
5549893a7440486e13fa0b37deacfc52.bin
-
Size
23.0MB
-
Sample
241018-bp49ms1bkk
-
MD5
bb60720ffd03f527a7c27f270e796a15
-
SHA1
7f74ba8834aa70ca283acd1a4320e557f3da080d
-
SHA256
3af83b9fd6d44e79d3cb01decd565cec0fd5db872de3aec1831babd436fcb226
-
SHA512
08ead531b6a483de7ce789dfb8a2822174fbc1c9c38801a8b66fa81f7eacea801a8d757cee8d2b9040289ae89840c67ef5f137632319b53e0ad15bd463c6821e
-
SSDEEP
393216:BLy99oxL8dtKI/ACq74Czo7Eie7QRmlosysPNKUCgvjRVJoF8l6bcDAWC:BLypTmCqjzotV6nyGN379oFXyFC
Behavioral task
behavioral1
Sample
testingflrplgpreg-main/DiscordSRV.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testingflrplgpreg-main/DiscordSRV.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.102.jar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.102.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.98.jar
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.98.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
testingflrplgpreg-main/TAB v4.1.5.jar
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
testingflrplgpreg-main/TAB v4.1.5.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
testingflrplgpreg-main/Vault.jar
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
testingflrplgpreg-main/Vault.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
testingflrplgpreg-main/baks-zapret.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
testingflrplgpreg-main/baks-zapret.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
testingflrplgpreg-main/connector1.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
testingflrplgpreg-main/connector1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
testingflrplgpreg-main/plug/voidaddons.jar
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
testingflrplgpreg-main/plug/voidaddons.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
testingflrplgpreg-main/starter.sh
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
testingflrplgpreg-main/starter.sh
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
testingflrplgpreg-main/zapretka.exe
Resource
win7-20241010-en
Malware Config
Extracted
metasploit
windows/reverse_tcp
89.204.90.65:4444
Targets
-
-
Target
testingflrplgpreg-main/DiscordSRV.jar
-
Size
9.8MB
-
MD5
1653da0d8ff485ed138bbf3f4c03aa2e
-
SHA1
f55005317a18ec583a64821cf310b91d8f475c15
-
SHA256
cc8ee0e5b4a053369095b810a527895ee1357b4f1a9e7c82d769eaf5e4699798
-
SHA512
d1e43715fbac2a83360057e4760a0e7e70bb26be5621a596ee3c95d718acfb801707e74f0ee1782dbb0f4877eab0159335a61c893dbcdd682752a868af33521f
-
SSDEEP
196608:8/NArCr09d+JSf2RwXEHMkVdG+Ih6zXsO8tEAMylrhKKUJK:ANAhUJtskS+IgXb8WwlrhxUs
Score1/10 -
-
-
Target
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.102.jar
-
Size
1.4MB
-
MD5
d4643caba77ca5bb7d579b964dca06ec
-
SHA1
4581d81f6cc7966ddba3744d5f2ea4dd16c5760f
-
SHA256
9da9d097029759e4224bd8b560b5e333dd46eb8f9a73baa740f0367181f7c5bf
-
SHA512
bd5ee3c0dc40bec928dddf1ef4e3fe0e11d65d5052834346f9d7e1c12f53d9aac52130a0a54e2795f5e126684eac1cdd2ebb1e4c27a40505358e656aebd113c1
-
SSDEEP
24576:CJahQm+SvL0hsltXBFXhg455YKOBljwpC2VAThgD+0YNkTF1OavQJ:C0aO0stOBljeCEAThCxY6Savc
Score1/10 -
-
-
Target
testingflrplgpreg-main/LuckPerms-Bukkit-5.4.98.jar
-
Size
1.4MB
-
MD5
d4643caba77ca5bb7d579b964dca06ec
-
SHA1
4581d81f6cc7966ddba3744d5f2ea4dd16c5760f
-
SHA256
9da9d097029759e4224bd8b560b5e333dd46eb8f9a73baa740f0367181f7c5bf
-
SHA512
bd5ee3c0dc40bec928dddf1ef4e3fe0e11d65d5052834346f9d7e1c12f53d9aac52130a0a54e2795f5e126684eac1cdd2ebb1e4c27a40505358e656aebd113c1
-
SSDEEP
24576:CJahQm+SvL0hsltXBFXhg455YKOBljwpC2VAThgD+0YNkTF1OavQJ:C0aO0stOBljeCEAThCxY6Savc
Score1/10 -
-
-
Target
testingflrplgpreg-main/TAB v4.1.5.jar
-
Size
1.4MB
-
MD5
0f68c7cd0934fbdd99411e9a3822afb0
-
SHA1
ebdae7dc3d57f3b3bc958e9f90349314ef4e11af
-
SHA256
80f8cc397b8cd15a219d727707e0ea9ab930e543017bc9dcd1635f52c40d5968
-
SHA512
891ebf72e5360a801c9f38e475ca885d9c7ee881288a5c820734cf59326e0a31584e1e534134208c9289a787354f37f5d8cd3d5d0a69a61a8cd5cfa997342e5b
-
SSDEEP
24576:/Q6Yw76S80KxqEGiYj0lfr809cldSHCpUTK2bv3lPHf+j57FQKPeaKBr+VEIhY:/Qbw76hhYAlf409odSi633t/+PNKheZY
Score1/10 -
-
-
Target
testingflrplgpreg-main/Vault.jar
-
Size
336KB
-
MD5
7964a95b8434eed2e7a88a77e87b583c
-
SHA1
33b3d491c8786932ea68fa5f78f6c0a66e3750e3
-
SHA256
34b1037d34257d4d8198fb81c1f40c57cd4723c4df51304623621fc41e242124
-
SHA512
d0f71b7cc8d2ebbaa7ebd24e2de20a120f7dd94d928519faad758914bffc6220bfe497d36310ae09f0df50c2eb8097d7f573d6c9ab6ca50034537a03942a4b24
-
SSDEEP
6144:Fn9nV6ioIgjPWGaWmTH99+jAlVKyyH949+bqYfrRbD6sj9MKDop51:Fn9UiAP/a/4QnyHw+bqYtqsj9MAoh
Score1/10 -
-
-
Target
testingflrplgpreg-main/baks-zapret.exe
-
Size
1.3MB
-
MD5
2cbf4b1ef30e6156b41f78cff4040287
-
SHA1
6e1968746690e6a4189c9c3a30168654445701c8
-
SHA256
7f40eaffe324e40a3d39b6d960c010be914243de7b05554716ed9c4900bb188c
-
SHA512
3ba5c15bccabaa740044664a98b0e27cebe95c3df2ce3a14a70d8929c3dfe27f9c01e6e66647cacf9b9f30f36ca4bfe8d1cad6a97601ab413f79c9be771878e1
-
SSDEEP
24576:l1eTCF7g2E9sb/uxNTMgyz+BcLDbPkACQjh/ZGx:eTU2Mgyz+BcnbPkcU
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
testingflrplgpreg-main/connector1.exe
-
Size
72KB
-
MD5
32282cfa34ebd3aa220bb196c683a46e
-
SHA1
4299a9a8e97a6ad330c1e0e2cc3368834a40f0cb
-
SHA256
3c3ce0355bfa42b379830b93a76cffd32fceed54e6b549ae4a1132ca30b392ff
-
SHA512
b567f434a313d270a53945a75d3303db179964faabde22786b37e8399b03d2ab664f11d03f93f5e22ea1aa8b38b1481fcdd302e688c5c1e9c3f1e3516ceebfb4
-
SSDEEP
1536:ISobLjmZ0irkrNHsFOjzPkA+2QMb+KR0Nc8QsJq39:uHKZ1eVzskQe0Nc8QsC9
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
-
-
Target
testingflrplgpreg-main/plug/voidaddons.jar
-
Size
1.3MB
-
MD5
3b0460c7eb57cabbf52d0bac3bd498f2
-
SHA1
abccdcd3337325bf5c701b94df492ab617f20d8c
-
SHA256
dc5f1fa8189d167e9e67ce84c86fcd83d18b136c4ceeecf3220a57b545f8b60a
-
SHA512
ad3d542550f7099b2ee733c1d1cb2cf61a801aa554615c7dbdd7aa25c2b9ecd5ff062d1a70544b09735bfed0010d94e17bb46803ced8a8c6c453d1ea2787ce4f
-
SSDEEP
24576:/IbTOygP10a/MTMiCCKFZlOXh/0PgoECkl5Ujb89yXt:/IbTBCUTRbKj0Xh/PxXYb89yXt
Score1/10 -
-
-
Target
testingflrplgpreg-main/starter.sh
-
Size
354B
-
MD5
4ac2e1eb84edfb09be2f9bca9a58de11
-
SHA1
d5ac50e52e5685fe1dd6ab69f8d21fd7f87ce5b6
-
SHA256
1b3f7ab5e2053a2dc592d0a9a798f85eb63aba47a46c5cc8206bb7040573afe6
-
SHA512
45001ba154eb215a476c1ea0dfa5f2bbbc50d120fe2c2a8d63e5f7601a515b8942ea5bbba03e6b9477a75674fe7755473862282aba832602556bbea8cd90c542
Score3/10 -
-
-
Target
testingflrplgpreg-main/zapretka.exe
-
Size
1.3MB
-
MD5
80c93e18eb2b5afecb20193abbd53804
-
SHA1
7f2f37bbb20b5cd0f353bec950e80b3a7129b4a3
-
SHA256
7cea393fe83fa489ce72e45ca6fdaeac0d86061f298a090ac4ac0a0c21d78ccf
-
SHA512
f3545d1a6adab75908d67bfafb4a40253d5066f292cb44f69f3faa12c7526733d90b65e7402d9841ae18c60b701c8f3d7e9ff4cb6f5abb2c22f7edb65ad5baff
-
SSDEEP
24576:75v4DT3ehpVLtT43PnMV2sES1Sw4stLNzpV7kIZIT+EvhLhTYDyVuCWN/+:dqTapX6024Yw4sBdpcphLhTWhH+
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-