Overview
overview
10Static
static
8Ehhbsuuemv.exe
windows7-x64
10Ehhbsuuemv.exe
windows10-2004-x64
10GjIEmKW.exe
windows7-x64
10GjIEmKW.exe
windows10-2004-x64
10Jtvcsfni.exe
windows7-x64
10Jtvcsfni.exe
windows10-2004-x64
10OriginalBuild.exe
windows7-x64
3OriginalBuild.exe
windows10-2004-x64
8PUMPED_docc.exe
windows7-x64
10PUMPED_docc.exe
windows10-2004-x64
10Servicing-...te.pdf
windows7-x64
3Servicing-...te.pdf
windows10-2004-x64
3cgu3.docx
windows7-x64
6cgu3.docx
windows10-2004-x64
6debt.rtf.lnk
windows7-x64
10debt.rtf.lnk
windows10-2004-x64
10eeee.dotm
windows7-x64
3eeee.dotm
windows10-2004-x64
1egor.dotm
windows7-x64
10egor.dotm
windows10-2004-x64
10errr.dotm
windows7-x64
3errr.dotm
windows10-2004-x64
1example.dotm
windows7-x64
10example.dotm
windows10-2004-x64
10fasfs.dotm
windows7-x64
10fasfs.dotm
windows10-2004-x64
10ferrr.dotm
windows7-x64
3ferrr.dotm
windows10-2004-x64
1fffffffnew.dotm
windows7-x64
10fffffffnew.dotm
windows10-2004-x64
10fp4h5ur67j.exe
windows7-x64
10fp4h5ur67j.exe
windows10-2004-x64
10General
-
Target
7a3b1e9c8df660dc1c1cf9b17411c1d6a4ffca364712c5de8ac46b1199ece1ce
-
Size
374.7MB
-
Sample
241111-c3wp4atqcj
-
MD5
65820b5345cae498c44cf90c63dd3160
-
SHA1
857f6b35c2e69a4df8e52094ef1f9acaacee8c60
-
SHA256
7a3b1e9c8df660dc1c1cf9b17411c1d6a4ffca364712c5de8ac46b1199ece1ce
-
SHA512
576df56b28250d69aeb9c95070a453928336c7beabe45b3bc108669810ffb2316a69bdf785b8472787328556d25ccd62d30e36d4945adb85e45a800369dce388
-
SSDEEP
6291456:Wfj+M5AE4HECh6/6p3vBaD0OFMZTuw8XPWD29On+lctEu6ieDAR43Wr/ggjghaFd:WfJAEIECpXfOFM+PWyNlZu6ieDASmr/B
Behavioral task
behavioral1
Sample
Ehhbsuuemv.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Ehhbsuuemv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
GjIEmKW.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
GjIEmKW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Jtvcsfni.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Jtvcsfni.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OriginalBuild.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
OriginalBuild.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PUMPED_docc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PUMPED_docc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Servicing-invoice-template.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Servicing-invoice-template.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cgu3.docx
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cgu3.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
debt.rtf.lnk
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
debt.rtf.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
eeee.dotm
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
eeee.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
egor.dotm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
egor.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
errr.dotm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
errr.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
example.dotm
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
example.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
fasfs.dotm
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
fasfs.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ferrr.dotm
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ferrr.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
fffffffnew.dotm
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
fffffffnew.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
fp4h5ur67j.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
fp4h5ur67j.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
45.137.65.94:4449
saiarsvkhzxxjyqd
-
delay
1
-
install
true
-
install_file
Google Update.exe
-
install_folder
%AppData%
Extracted
redline
doc
188.165.208.165:43504
-
auth_value
34724300c8d2e12e91046accfdc2379d
Extracted
https://musiccenterconference.com/dwl/12.ps1
Extracted
https://bitbucket.org/damnman/damn/downloads/Zos.exe
Extracted
https://cdn.discordapp.com/attachments/1074394309446619298/1085646503940464700/putty.exe
Extracted
https://bitbucket.org/damnman/damn/downloads/simplecryptservice.docx
Extracted
https://bitbucket.org/damnman/damn/downloads/PUMPED_docc.exe
Extracted
asyncrat
5.0.5
Venom Clients
45.137.65.94:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
redline
@forxids
37.220.87.13:48790
-
auth_value
63e73f2bdcf7259b4f61c8d04fa10a1b
Extracted
redline
@hukioside
37.220.87.13:48790
-
auth_value
7bb7435e1cb000627132c502060da133
Targets
-
-
Target
Ehhbsuuemv.exe
-
Size
68.4MB
-
MD5
368dc6c24db6c1550ce757c0ffbdd9a0
-
SHA1
89bf95d951ac065bdfd8a323b1ecb70355bbab20
-
SHA256
9f3d5e17974ea77849869573fcca4be15d641ea937fc23fceb2808c59612b641
-
SHA512
78c94132c3f426930bcc80fc8dab760f3ecedcb6747150ba72319a23adedfda7c7cdc494122899cca914b7a1daa859f2a9c54c9bacf5b2e9c2f5519275fb2211
-
SSDEEP
1572864:iEmgHZAuBtRvd59Tdd6ok1vPtBQmjbPV4dDO4oJV36euF3SGzcqj0:zFHZAytD5xdd6FNPtBQeCdDO4oW/P4
-
Asyncrat family
-
Detect ZGRat V2
-
Venomrat family
-
Zgrat family
-
Async RAT payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
GjIEmKW.exe
-
Size
646KB
-
MD5
f1721c98efdae451be8ef071044cdb85
-
SHA1
28afdff9b32d7da6918a4ecc3a30eafe3be1f8e6
-
SHA256
bce1a92464358055d118d7a107bf8d5361f4fc2dfaaa41a18d2a9bc11b640272
-
SHA512
5e560094bfdb5d9e0a0f545373c9943a57c1da12378153cd0943ac2b10da9fcd1e256a71777f5cab803f5c434db11cd6cdd463bdcd2fe36420d7db5f2c57ffaf
-
SSDEEP
12288:z4UBGj3cBfudMiILCLbexicLZHgVkbh11a9iZoyfetMYviLZ4uDFa:z49j3Z4Ld30v8R
Score10/10-
Asyncrat family
-
Suspicious use of SetThreadContext
-
-
-
Target
Jtvcsfni.exe
-
Size
300.9MB
-
MD5
fa2a122398f04f0a45ed7bed477aa4de
-
SHA1
dec80165e13f370fc832f6fe752084eb5ba944cb
-
SHA256
cde19a4b3504ff5f04a4291be87d98594673de5e3ba4d939b18305e7e1fd93a2
-
SHA512
332c34cde567511fc31422d75a77f183546998762f912844726e0b157d5c5bc29893e20b93e0ab5daa90908e39aab326743606ee090b38d73ba51b9d949e8905
-
SSDEEP
6291456:TzQXTpP65CUl6Xd+6a3BwpQTOQGZ+TmCI/0haPyrUVb0/29c1e1M51K:Y1jUl6sBwKgZXCI/0haqgVb0/l6
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-
-
-
Target
OriginalBuild.exe
-
Size
2.0MB
-
MD5
684b5a8761a8cd0314a1121de37a86a7
-
SHA1
bd46bea31f6ec26ad80bf9bdda6f2b59750a910a
-
SHA256
1fc6b522a006f923bd3e6d69377bdcbb6d6e733dc4f68f38608f727bf6b0732f
-
SHA512
d56b3b60d54ad8ac97b3baf3fc4cdf7ee0158dadd23239238d243d445906d30f8246f4053d53fc9b6f04c80d87c43f548e7cca4b424ec34b0474defa785fbb59
-
SSDEEP
24576:rLdSwtu5mVZJZYDN5ZKGGQz1JLzsrksuN8qYMLDd3eQ3o7glrAbAlA7AIASAWl9W:r6mVZJZYSVgvoklrAbAlA7AIASAzCq
Score8/10-
Blocklisted process makes network request
-
-
-
Target
PUMPED_docc.exe
-
Size
90.3MB
-
MD5
82bb565e772ed1286a2aae9c572650e9
-
SHA1
ca36bde4741afafb7fcf62a19673d13b80fb44c6
-
SHA256
25a410a81c32a80cd2c408fad31582e20a1e7fd01c28ef78576fd2cbb02761fc
-
SHA512
30861740c92d0022bbee72d638afbf44cd6276d2233e7ce51fc9fb5b7281a0cadb3b76f8b4ef8b3063c7a93960a1fab285aa8d01043ba4063366125ce6ec6e0b
-
SSDEEP
6144:7Bcs/4U/OaGR+X25Kmn9GFjzsLqBO6/b:tcsgXbKm4XGq86/b
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-
-
-
Target
Servicing-invoice-template.pdf
-
Size
34KB
-
MD5
d422843d566db462f7f8f6bc3be9ca76
-
SHA1
1b1b89d8227af285a658ba64a15e1f0a56953e46
-
SHA256
3fff1be296432c5b2cf165c63110531e8e4aa3e31285d1800d0ab92ece7e5c3a
-
SHA512
a62ad4534bd8b274df69de3dfc64595137941097742173f0e8d02307f35b5344bcfaf3151a203d6f5a24f2a4300996e7713db729763516cade8893e62d63e9cc
-
SSDEEP
768:zzy3jjj/ZX6HmbabFA7FFFjgXUfUU9ivyoWYU9NlgxUh3:zzijjjRXIcaZAtIyo+lD
Score3/10 -
-
-
Target
cgu3.docx
-
Size
12KB
-
MD5
3a99a5077f5178c4320e97d997cfbff1
-
SHA1
d3e053535607751b0a2d6dc5187f74dac3b1846d
-
SHA256
154dae89d0d92be206c9c006af8112f36ba1180f56334bfdbbf33668675a76a5
-
SHA512
218f3265617bd320e862b32591f7ef2c6bd85e9225d565281f54045486cc63593a89fb5c1b15853082554d84545a63492bed16ca73840cfd548e1ef4316b1f34
-
SSDEEP
192:CtfoVP+CCNxtpgoZ22NNMp14xew+Wfm0FfkvGUlfbN9urD9N:afo1+dNxt/ZtNN04+30On50n9N
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
debt.rtf.lnk
-
Size
1KB
-
MD5
fdfc8fbec85d876fafc78d0d6d5bfb2b
-
SHA1
8787a1343b2610079c48f3d315c9dc9f618793c1
-
SHA256
95d5648444fbd18f4f19a7a7821e2e35cdd27b2ddfb40bf6dd60f1303660824a
-
SHA512
790a604522bfcd26cb738dc19121ba70f4b65a7a4a5fd5df8a7cd51069b3645fee42f25ed026152ce10fb83bfe7d23774b91abf3b8e8ddae0d3311d97d7e01bf
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
eeee.dotm
-
Size
15KB
-
MD5
e98532e1f207b31dc7709a52b1c409b7
-
SHA1
b2715b7f3367c8a30d65fd06ae8a201e53d9123d
-
SHA256
3d355a08aefd906bd5c4f5db39535e172f06f646c18be73f7b6d4dc6ed54c5ab
-
SHA512
13ff9836180e75881340bc5eec2285c6dfd2c7cd2aa968be5ad7673e905c17862d3709571426793c8fc886beb7969c1cfc7585f3bf60a8590f5e90fbfca28e85
-
SSDEEP
384:tmtl4DqphrASTC78Jex7KBM6akwLWdxdyJYB3ywJ:ql4DqphM98JkYakw6Ly+QwJ
Score3/10 -
-
-
Target
egor.dotm
-
Size
14KB
-
MD5
adccb9016b434427cd125ae841d1baaf
-
SHA1
56aa1a0e7b1ba0d2714be1e36d4a59ca4ca8a05d
-
SHA256
d6cdc6b64b477100f73ffa15b1fe7597e3a6c81431b527bc766f7bab27701e8b
-
SHA512
9b4fbb5f16570c7a5165a53ffab8680db2122e3040ed411358f2a4fee2d8a24d525ab430651b0c1d1f93f8b7471b8ba9f7b58a96b167e5245a082a0d51c35c62
-
SSDEEP
384:tmtl44XewvWv7lC78WQ6Su6akwLWdxdFYB3w:ql44XHvWTu8mSzakw6LqG
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
errr.dotm
-
Size
14KB
-
MD5
15320db9003264c8ce3a7356030746a8
-
SHA1
db6c48cb0b2ea475602ee20bd10d6be192da4a37
-
SHA256
ed057ee336974e52d68f2eb5278c7d61fdbfff8f388e287d4c8c09bd2eed0a2f
-
SHA512
608015f8c7ede90b8859fe2c2838322db98e78ff1e369d1a3019cbfb8d279ca515e2494e0d6946d17cdbed1582faeac2ce2bd53eadbe45751dba542794b0a758
-
SSDEEP
384:tmtl4pb+aVHXwnSC78Qot2J6akwLWdxd36UbYB3ho:ql4pq6El8Qojakw6L0M
Score3/10 -
-
-
Target
example.dotm
-
Size
16KB
-
MD5
1aae26fe5d7b7dc4d6794a7828aecedc
-
SHA1
fbb8c6f45f53dc80e276a72cf9f567054b65c206
-
SHA256
1d473e82efa66368ffb4ce8f5eb947296c8e8d3febbe3a6283857da6fb1cc7d5
-
SHA512
2036693971d4710c9d59c569a8a8fef98ee33422b324c343c07aac9fb67500f82e54c6904054f65a7294dbbc745773fdbf6a6051aa7a71ac8b04b9c3dcf5c6e0
-
SSDEEP
384:tBt67TB+TZ2T/aNxt/ZtNNei/eX+30Oncsqf:R6PaGIxllNeAeX+3BcBf
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
fasfs.dotm
-
Size
16KB
-
MD5
56265082f8036943f8aa659cda6b4b6f
-
SHA1
4b4c75a574e7bc18117cecfe8cad64205097ec43
-
SHA256
4adf62e4e36861567206126d6ef1a1d59bf169f9c72cde72dad9a3bfe0c09faf
-
SHA512
33792ecfeaf686435db9d6537b8e99d74b08198c198e3357b0b6ba324f7c5eb410060a34e64b2a09aa3b20f9a7b459ae6b13670abb4e03550ffb79fb0e155c2d
-
SSDEEP
384:tmtLW4BPok2xSxCyX+ZKC78qN9j6akwLWdxdA97YB3H/:qa4Bn2xzyX+383akw6L2M9
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
-
-
Target
ferrr.dotm
-
Size
15KB
-
MD5
2fcd4aa1392a81644323e0dfc715146f
-
SHA1
bb48a7af90cdb8c46e78bb20fb7e733c626d4f2f
-
SHA256
58ab07d938bb5a6a5c2fb772f4b511b805b6e9c165ed01280c4ee9a1c817f9dc
-
SHA512
91bccc3fba9abbab4b052c394274de3d701d5c6a06b36c2df688f3f36c0296835d028e966eb331ebdea863c34be63f03cfb604b1583640e6edee0de3a81bc639
-
SSDEEP
384:tmtl4Ttwa5+VjgUbuC78Qo0mR6akwLWdxdf8YB3U:ql4Ttwp2UbZ8QZm0akw6Lxi
Score3/10 -
-
-
Target
fffffffnew.dotm
-
Size
16KB
-
MD5
56265082f8036943f8aa659cda6b4b6f
-
SHA1
4b4c75a574e7bc18117cecfe8cad64205097ec43
-
SHA256
4adf62e4e36861567206126d6ef1a1d59bf169f9c72cde72dad9a3bfe0c09faf
-
SHA512
33792ecfeaf686435db9d6537b8e99d74b08198c198e3357b0b6ba324f7c5eb410060a34e64b2a09aa3b20f9a7b459ae6b13670abb4e03550ffb79fb0e155c2d
-
SSDEEP
384:tmtLW4BPok2xSxCyX+ZKC78qN9j6akwLWdxdA97YB3H/:qa4Bn2xzyX+383akw6L2M9
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
-
-
Target
fp4h5ur67j.exe
-
Size
1.3MB
-
MD5
8cd05b06930579102407341364cdedd4
-
SHA1
f1c3d91406f6e461c67d7c12c26d43968cd42031
-
SHA256
5859d191a74777c836d807c66f0dcd9ce61d792997e5fae991dd5297b1065d83
-
SHA512
06b799f4e57ca6ebc168021e9f19904fceb467e65684a0391d8325bec341c8776cadea8555afe9a0874203085044983106a50f6a3062c9b5d9f84de7d34f4354
-
SSDEEP
6144:q2AdvNiBrRuWzr3Qk7AOziNR14LE8mnq4wqluSPB0YJpc:3AdvNsrXv781vwr7YJq
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
Uses the VBS compiler for execution
-
Suspicious use of SetThreadContext
-