Resubmissions
10-11-2024 18:35
241110-w8jr9s1rhw 1004-11-2024 17:00
241104-vjdpaatfnj 1003-11-2024 15:12
241103-slhpxazmen 10Analysis
-
max time kernel
1s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 17:00
Behavioral task
behavioral1
Sample
ElectronV3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ElectronV3.exe
Resource
win10v2004-20241007-en
General
-
Target
ElectronV3.exe
-
Size
37.8MB
-
MD5
1cbe8585b431cf47c67d346873d73b86
-
SHA1
411627116f8ad58fac2bcd805871d3eedaeea29b
-
SHA256
0df18ecef55a3c251ee62a5c6253b82d7d970b5312a9f399a1731405b73a2793
-
SHA512
733d1256d97298c87f17b814b6edcc29ff12832258e184126a8416cc6d3b241dca5caf15022e7b84e5b4465c2b587adbfd0128b3e4714127daa51ec6676bef7f
-
SSDEEP
786432:JG0CL9iGLQyZFu8HkDC/UbUjfge+1y3GIwAZ5eiGg1iEc2dQ/7K4rv3FqbE:JG0CwG3q87/EU41qVjGg1i/uQ/GUqbE
Malware Config
Signatures
-
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\_MEI28602\python310.dll upx \Users\Admin\AppData\Local\Temp\_MEI28602\python310.dll upx behavioral1/memory/2636-49-0x000007FEF6710000-0x000007FEF6B75000-memory.dmp upx
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
613KB
MD52ef36f0623079a4f4183d6344db90c1a
SHA13268cd85138b0339dc0abb3629a1913168af010d
SHA256f46212b9ddd32095e936e7f7ad0ce40cb72c0ba8bbe53376a1e54be8d381cddf
SHA5123af970450b132ba53700c7a90bfbcbe0a6cdcba9559dee250279d8e6a4f7f2c8b54c1e6429665e9bd9784bd873a2803971d09d2032407863451d886d2900fa15
-
Filesize
339KB
MD5adcfc9068ea4e868338b995e9dccf1e1
SHA1a9da33315821ed8249385f7c3897d478e5acce36
SHA256c322ee3ac3e1d97bb10b2911538c35b05ee2a0ab72a7ae627d2242533fa307f6
SHA51208c55fe0d7720f5d8f93f38c8f7d916f124cbd80a9f9af40f63c03869a650837c64a7bbad7bcc3dc6ba48c387bbba5a10a7c9aa44c75acc28f749941258c160a