General

  • Target

    Spammer.exe

  • Size

    10.3MB

  • Sample

    241019-zes1mazckr

  • MD5

    c157d6596197035913df51690b5aefca

  • SHA1

    b5a3f07e7d53ba1ec6c4628096464be57a11c991

  • SHA256

    0d758fa0a4c3a9a4b634fb08211078d408418148215105ef3e30a492672bfda1

  • SHA512

    6565e0f96664c6cf39bedeaf35b9db104db53a4892e14211bb2f0b95b4f0d11c849c42a4adf799b5f75ea657d4b6b03472a3250250337599574212552dee0302

  • SSDEEP

    196608:Muin3DxOpJlXC4NmNumGOEJohaDjx4a0FAwYxM4NBXSrgllqbvYK:M3nTxOpJUi/raMjm2BPNMrgGY

Malware Config

Targets

    • Target

      Spammer.exe

    • Size

      10.3MB

    • MD5

      c157d6596197035913df51690b5aefca

    • SHA1

      b5a3f07e7d53ba1ec6c4628096464be57a11c991

    • SHA256

      0d758fa0a4c3a9a4b634fb08211078d408418148215105ef3e30a492672bfda1

    • SHA512

      6565e0f96664c6cf39bedeaf35b9db104db53a4892e14211bb2f0b95b4f0d11c849c42a4adf799b5f75ea657d4b6b03472a3250250337599574212552dee0302

    • SSDEEP

      196608:Muin3DxOpJlXC4NmNumGOEJohaDjx4a0FAwYxM4NBXSrgllqbvYK:M3nTxOpJUi/raMjm2BPNMrgGY

    Score
    7/10
    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      discord_token_grabber.pyc

    • Size

      8KB

    • MD5

      05b1abcf2b8f1457cee0f078bdbb04f0

    • SHA1

      ce070d54e1d54ffd6c4d96b616f21b7466a062c7

    • SHA256

      2e82faaefa817254cf2a9d5149e3c36c04c3e09aca0bcc1a4e4fa894e137c1b1

    • SHA512

      5af2746296f191af559639b1c5463993e8c4fb25ef945677142a6a02486e6670669eb5a5bdd4c163f1bdd8bd35a7bb8998bbf32e4d0fe9d35db379cf80159a57

    • SSDEEP

      192:iQR8Lslmujbwybyo5HptlYwqJFD7U6r18ZPuNz:vNmcwcpt+D7Ua18uz

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      5KB

    • MD5

      ab0f8084441f8312bffc9d26193967ab

    • SHA1

      82b9c1c9cd1f5a38ac2b415a96c88ce99d27455a

    • SHA256

      6f67d11524ed42b8990be66aed829232514b364746fdceea30e0213204427be4

    • SHA512

      1722dfe7200b5f8fef0cfc4188953621630c7ee8672586490b9309a40512eb7f99fc56ffe52f6a0970809a38e3bdd8ce1862ba6803fe6d09bdfacda1b3fe1732

    • SSDEEP

      96:4Q0jzMv/ppR+xVBcnqhLchLPxrpTkBWeBDFZcj3KldyzoZ:sSZYXPhYhLP12zij3KnyA

    Score
    3/10
    • Target

      misc.pyc

    • Size

      2KB

    • MD5

      5bff7de9304595611b9deeea55076bd3

    • SHA1

      ae5fd2f3fbac4b0587140ab41b30c4d3da286c75

    • SHA256

      39c73d32dce8fe34f56ca6fce56ae54ca99456c49fa04c949a45ca7d8e7355d9

    • SHA512

      4cb8277d8c02380679bcc19ec6cba2dae37b24058116e08cfec30f95a158c1c3b45590c79665ace9abbeda277f1f39be1e806fd90c8dae9a3c44cd69d1157679

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      4KB

    • MD5

      dbd5603fbc95768a5f3f45e6e1f7f109

    • SHA1

      b1fa1a73c1e9e0ee63cccf5a81210a8aa39bf40a

    • SHA256

      657361e158e5b5d76cf2b615d58c7c34de2d06d40f1c049c0757019fadab5e13

    • SHA512

      310aabd4b5ef007faaaac149ea5b182c20eb3db2ea576e1039fc86d8ed5bb7e63b437d10c2c876ab40a0f9f7782dbfc5804d02cf12a0d74d9b1fe5b1a9a035d5

    • SSDEEP

      96:4APDnTWeYwD86gWxS6679kZOyfkoXyWQUUEXtH0lLCvpW1mhs0:FzCUD/S6UyRkpoUEKlLz1m+0

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      64KB

    • MD5

      2cb822a45dd8fe9d0e6a5285f0f3eb28

    • SHA1

      3efa23194eb5d5a2683e9b680bbb6999a02b16fa

    • SHA256

      cbdd2a4543a75a98fdc1751c1f5dd975f8a5d9061bcac5a012b90186b81ae790

    • SHA512

      d112aa47bb1c6bbf829089bff4cf986d3b163d7db62eb89b31930fbed352a5a9e762a29ba7e68f71cc3ecc2627443ed70016f343ff7716f7b5be5231b3b4411b

    • SSDEEP

      1536:HmBvpSBVqhGjeCBdjxVFH3dBUoHFrbru2:W8XHNNVFDUoHFb

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks