Overview
overview
10Static
static
3ReturnThie....0.exe
windows7-x64
7ReturnThie....0.exe
windows10-2004-x64
8$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDIR/app-64.7z
windows7-x64
7$PLUGINSDIR/app-64.7z
windows10-2004-x64
8LICENSES.c...m.html
windows7-x64
3LICENSES.c...m.html
windows10-2004-x64
3ReturnThief.exe
windows7-x64
1ReturnThief.exe
windows10-2004-x64
d3dcompiler_47.dll
windows10-2004-x64
1ffmpeg.dll
windows7-x64
1ffmpeg.dll
windows10-2004-x64
1libEGL.dll
windows7-x64
1libEGL.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1locales/af.ps1
windows7-x64
3locales/af.ps1
windows10-2004-x64
3locales/en-US.pak
windows7-x64
3locales/en-US.pak
windows10-2004-x64
3locales/uk.ps1
windows7-x64
3locales/uk.ps1
windows10-2004-x64
3resources.pak
windows7-x64
3resources.pak
windows10-2004-x64
3resources/app.asar
windows7-x64
3General
-
Target
ReturnThief Setup 1.0.0.exe
-
Size
83.1MB
-
Sample
241113-yw4m1s1rel
-
MD5
b2ff937db8ae9dae85203d8ff443d1d5
-
SHA1
8d0bb2f786c73015f1a830a8aade0df8a3bdcb7c
-
SHA256
1d9a3c8728d6868857aaa0d0817bcffab975fdaed769b2d70a750972280c8c72
-
SHA512
e2cb72f696cb04432431f9194be9c966fb635273200ad501ad383873f49f4b9d8594354653640024d63b916e9e75a7f40e0d31a1258f36960ee5e223ea542865
-
SSDEEP
1572864:fTJ39Kk9MaLcLAeydx32B8ceyIS7nqYdd6hIExeIg6q7BMp:fGk9MaLC//vP7nMxeIg6WMp
Static task
static1
Behavioral task
behavioral1
Sample
ReturnThief Setup 1.0.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ReturnThief Setup 1.0.0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/SpiderBanner.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/WinShell.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/WinShell.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/app-64.7z
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/app-64.7z
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
LICENSES.chromium.html
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
LICENSES.chromium.html
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
ReturnThief.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
ReturnThief.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
d3dcompiler_47.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral18
Sample
ffmpeg.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
ffmpeg.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
libEGL.dll
Resource
win7-20241010-en
Behavioral task
behavioral21
Sample
libEGL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
libGLESv2.dll
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
libGLESv2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
locales/af.ps1
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
locales/af.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
locales/en-US.pak
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
locales/en-US.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
locales/uk.ps1
Resource
win7-20240708-en
Behavioral task
behavioral29
Sample
locales/uk.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
resources.pak
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
resources.pak
Resource
win10v2004-20241007-en
Behavioral task
behavioral32
Sample
resources/app.asar
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
ReturnThief Setup 1.0.0.exe
-
Size
83.1MB
-
MD5
b2ff937db8ae9dae85203d8ff443d1d5
-
SHA1
8d0bb2f786c73015f1a830a8aade0df8a3bdcb7c
-
SHA256
1d9a3c8728d6868857aaa0d0817bcffab975fdaed769b2d70a750972280c8c72
-
SHA512
e2cb72f696cb04432431f9194be9c966fb635273200ad501ad383873f49f4b9d8594354653640024d63b916e9e75a7f40e0d31a1258f36960ee5e223ea542865
-
SSDEEP
1572864:fTJ39Kk9MaLcLAeydx32B8ceyIS7nqYdd6hIExeIg6q7BMp:fGk9MaLC//vP7nMxeIg6WMp
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates processes with tasklist
-
-
-
Target
$PLUGINSDIR/SpiderBanner.dll
-
Size
9KB
-
MD5
17309e33b596ba3a5693b4d3e85cf8d7
-
SHA1
7d361836cf53df42021c7f2b148aec9458818c01
-
SHA256
996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
-
SHA512
1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298
-
SSDEEP
192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY
Score3/10 -
-
-
Target
$PLUGINSDIR/StdUtils.dll
-
Size
100KB
-
MD5
c6a6e03f77c313b267498515488c5740
-
SHA1
3d49fc2784b9450962ed6b82b46e9c3c957d7c15
-
SHA256
b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
-
SHA512
9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803
-
SSDEEP
3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
0d7ad4f45dc6f5aa87f606d0331c6901
-
SHA1
48df0911f0484cbe2a8cdd5362140b63c41ee457
-
SHA256
3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
-
SHA512
c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9
-
SSDEEP
192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6
Score3/10 -
-
-
Target
$PLUGINSDIR/WinShell.dll
-
Size
3KB
-
MD5
1cc7c37b7e0c8cd8bf04b6cc283e1e56
-
SHA1
0b9519763be6625bd5abce175dcc59c96d100d4c
-
SHA256
9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
-
SHA512
7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f
Score3/10 -
-
-
Target
$PLUGINSDIR/app-64.7z
-
Size
82.3MB
-
MD5
cb1ba9cbec946e070330bf6b7ea9fcec
-
SHA1
7440ce7c460cc6e8bc485be748064cde35f0d178
-
SHA256
f3712d37b10e45146d0f2e60d7694e1e81339bff472dace653fc1d0b00089783
-
SHA512
0d31b8d2fe90ff4636a7eda96eac1809a1c88039781cb32c8d6d5b49e93f631287876f68694e238de07dfb23177526c75e369d3d4171ab24e96cfd28506556ae
-
SSDEEP
1572864:NJ39Kk9MaLcLAeydx32B8ceyIS7nqYdd6hIExeIg6q7BMn:Mk9MaLC//vP7nMxeIg6WMn
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
-
-
Target
LICENSES.chromium.html
-
Size
7.9MB
-
MD5
8303b3a19888f41062a614cd95b2e2d2
-
SHA1
a112ee5559c27b01e3114cf10050531cab3d98a6
-
SHA256
9c088caac76cf5be69e0397d76fe9397017585cffdba327692ff1b3a6c00d68f
-
SHA512
281b2ecc99502a050ee69e31256dec135e8cb877d1a6ba9f1c975fcfb11c062980ee6061d2368b62f91e392953ae6235dd726a9d98e6efc1302f7ed713099179
-
SSDEEP
24576:dbTq6T06T5kJWSIRWnBIl70mfT76y6E65606F/HXpErpem:t4scj
Score3/10 -
-
-
Target
ReturnThief.exe
-
Size
154.8MB
-
MD5
4dac19cb064610e349e61da8d3421ee6
-
SHA1
7705d91bb1aaa69bd9071c0a15f16fd44fa07fbd
-
SHA256
337fd4c1abb47d3f3d4fcc9fab412a0d11433d10186a3176f6ee0624e51e9940
-
SHA512
f71be24bc67c17dd6499355c4505f565930a9f55d02203cbc151de13cd8f2b806bdfe27f10d21207d838e63bdb4c7f1f9c5d8fb356666fda23054abcb2916edc
-
SSDEEP
1572864:XTmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:ov6E70+Mk
Score10/10-
Hexon family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates processes with tasklist
-
-
-
Target
d3dcompiler_47.dll
-
Size
4.7MB
-
MD5
2191e768cc2e19009dad20dc999135a3
-
SHA1
f49a46ba0e954e657aaed1c9019a53d194272b6a
-
SHA256
7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
-
SHA512
5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970
-
SSDEEP
49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l
Score1/10 -
-
-
Target
ffmpeg.dll
-
Size
2.7MB
-
MD5
a007299c49fa50aeff594655859780ae
-
SHA1
d202f1f617023763a0e9418878e8ecac96be9fd4
-
SHA256
b78f0036621ad1d5833289f2ad509963ef78f1a89a3c7df0f1370fd2d35a2804
-
SHA512
444c4baa1e1d941bd04f78184cec519c6eb53a83fbc3aa3ea30522bffc9ecde73ebe7b910c1a37c345429298ada3c0ffcb3e3849e21b2009487b5cd1a02cb2a9
-
SSDEEP
49152:WdTodIrn9wbFV6Ps2cA7SJ/W1C1fLPzhkE7hjU7gUxGJwDw3lCQTQY/N3lzl3heH:C79fe/CmP6w3lXQYef/3
Score1/10 -
-
-
Target
libEGL.dll
-
Size
469KB
-
MD5
ca5bb0794b7700601e9438283d458665
-
SHA1
7fcf090b19820b9450937be800575c526448b581
-
SHA256
4a8be3b4d9fe790efdce38cff8f312a2f8276908d6703e0c6c37818e217cf1e3
-
SHA512
36ebab858fe7e014837548575389e7df2e86676888e4a9039c736d0f2e6463102e68989b794d949ddb16d9bcce43ce55737fcf2a4b09b1667bf968a9540e9f32
-
SSDEEP
6144:afuE2DT96QHENooSYBjLkt4sasMHemPwlrX+nZiML7hn:afuE2DbkGoS2jLku/wWUiNn
Score1/10 -
-
-
Target
libGLESv2.dll
-
Size
7.3MB
-
MD5
05b585464f18fe0e3bddb20527697d66
-
SHA1
8bcec2f0b409afa9ff054e25f3ce85eb9bd50010
-
SHA256
0bb7c6c08b569c1d2de90a40e6c142591e160a7c6cb15d21807f3404a48c4287
-
SHA512
f680ab9c3070f443c7359bb3f0c2032f5c58c88c7823e4592e8212ce8815ea5f463c86df113f5320944c62d3cb4e8d45b9b4dcaadccc1ac9bf203ae4bb52083c
-
SSDEEP
98304:WJTPQhRQ4t2fzqJ3IZ155Rl5F/tpcAgsOMN:Wm2foIzRJosr
Score1/10 -
-
-
Target
locales/af.pak
-
Size
368KB
-
MD5
7e51349edc7e6aed122bfa00970fab80
-
SHA1
eb6df68501ecce2090e1af5837b5f15ac3a775eb
-
SHA256
f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97
-
SHA512
69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d
-
SSDEEP
6144:ebGJWQdLX/Wi6fR9a5DhZ2FQPnUGSBhjA636Zi2Jyn9Ybt5KXpgmLwSVxJsVxSjf:6GJW2bOi6fRmZ2OPnUThjA636Zi2Jynd
Score3/10 -
-
-
Target
locales/en-US.pak
-
Size
338KB
-
MD5
5e3813e616a101e4a169b05f40879a62
-
SHA1
615e4d94f69625dda81dfaec7f14e9ee320a2884
-
SHA256
4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687
-
SHA512
764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594
-
SSDEEP
6144:xiLqIY2MuZYLMMP9ecGmM8faYdY4K55TiSbn8vMwS:xiLqIp34MM+mM0Y55eSKMwS
Score3/10 -
-
-
Target
locales/uk.pak
-
Size
688KB
-
MD5
e4c4e3700469704b936460ca1a90fcc0
-
SHA1
e809990fc07a1d39fe623046382699e648e343c0
-
SHA256
29af2abc75a35bb9e3f9bc6e2904228ba651ea4e0ce8e9c7a2d7e272374b9ebb
-
SHA512
68e33f471c5bf2d4ed9cb00ace3e094ef102a5f1566a6e2c8a3007ef7fbd8a24c36eb36b08745f3608e70940444e9fc7a36fabe1a9945d1f00b4f3f28c7bdaf6
-
SSDEEP
12288:FkzOqMnty/KiZswU1nbx05kB3IjUUmEg5KuoLNiXElqnOyh:muGN35EEK
Score3/10 -
-
-
Target
resources.pak
-
Size
5.0MB
-
MD5
31c7d4b11ad95dfe539dd098e0fab736
-
SHA1
5418682d939ce8485ecc9125b872c14ffec662c2
-
SHA256
a251019eb08f1e695e935d224544bda37c5ae092ba68a89fa1fe3bd19bde4f5c
-
SHA512
f868a4afa4e0d5c561873d2a728e267f98da2df3fb90966e5736d496b6a24e71769a02b0346b27b7dcce11cbe07248e309f50a89977dc8e5bbc06d6cc31bf738
-
SSDEEP
98304:9LYsbEcnNWz49PDq2Awkmqmcph1Dd42cjrwrbHw4o0DPelwG3RC:90WcMButpphpd4jkrU4oeelrRC
Score3/10 -
-
-
Target
resources/app.asar
-
Size
65.3MB
-
MD5
4f245229ceee2b823303a3c5db24b1bb
-
SHA1
aba6e0b52edf08bd70fd0a051b1c8321de915cc6
-
SHA256
e8165e45d402a8e63e53a19ea08e2748723aed1eac4a7b8d7c901aa22240e6e3
-
SHA512
4b05407ff831450b06ee97462e41166b50866677e91db315b1745e5214c14331e2b998968ac5c664801070fc85588241677f85f16b921917cc128ef26cae5aa8
-
SSDEEP
196608:czsSrubKylBcEK1u/gNGp/GIpKcYU+x1gsBrpBVb/zC7322CNk/gNk5soeSRdBig:quFwEKPksSLqHBFBd/utCZIRjF5+bm
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1