Overview
overview
7Static
static
3TikTok Bot...oM.zip
windows10-ltsc 2021-x64
1For More C...re.url
windows10-ltsc 2021-x64
1Password.txt
windows10-ltsc 2021-x64
1Setup/For ...re.url
windows10-ltsc 2021-x64
1Setup/TikT...ed.exe
windows10-ltsc 2021-x64
7inFo/Dr.Fa...ok.url
windows10-ltsc 2021-x64
1inFo/Dr.Fa...er.url
windows10-ltsc 2021-x64
1inFo/Dr.Fa...te.url
windows10-ltsc 2021-x64
1inFo/For M...re.url
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
422s -
max time network
428s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
01-11-2024 17:11
Static task
static1
Behavioral task
behavioral1
Sample
TikTok Bot Pro v3.5.6 Full Activated - WwW.Dr-FarFar.CoM.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
For More Cracked Software.url
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Password.txt
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Setup/For More Cracked Software.url
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
Setup/TikTok Bot Pro Full Activated.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
inFo/Dr.FarFar - Facebook.url
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
inFo/Dr.FarFar - Twitter.url
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
inFo/Dr.FarFar - WebSite.url
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
inFo/For More Cracked Software.url
Resource
win10ltsc2021-20241023-en
General
-
Target
TikTok Bot Pro v3.5.6 Full Activated - WwW.Dr-FarFar.CoM.zip
-
Size
52.2MB
-
MD5
3b1e34cf212d8e9540053eeb7cbffbff
-
SHA1
00a1a674575d03e755d0e83b091baf90c064528b
-
SHA256
7c4eb19ef6d2891576f88723e4d0a59f694a9c6a814f0761aa41d7e50473d8a2
-
SHA512
44f1f8a9aaa62eeb4aba032c84121ba6dedd1cbf261b4056b516ec9c65cef928e31a22fc0425494c50c8dc1583fed37ef2d3a1682632a729ed1a9f7974de50c0
-
SSDEEP
1572864:OlAPWnSW4/RcaAfpMcNlibRZn0W7Ovvk3GHc3u8H3pQOWg5:ZPKSW45sScL+n0WIskc3BHvWK
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 1980 7zFM.exe Token: 35 1980 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 1980 7zFM.exe