Resubmissions
11-11-2024 21:54
241111-1sg1ysxflg 10Analysis
-
max time kernel
97s -
max time network
142s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11-11-2024 21:54
Behavioral task
behavioral1
Sample
release.zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Release/Discord rat.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
builder.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
dnlib.dll
Resource
win10ltsc2021-20241023-en
General
-
Target
release.zip
-
Size
445KB
-
MD5
06a4fcd5eb3a39d7f50a0709de9900db
-
SHA1
50d089e915f69313a5187569cda4e6dec2d55ca7
-
SHA256
c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
-
SHA512
75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 2360 7zFM.exe Token: 35 2360 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 2360 7zFM.exe