Resubmissions

12-12-2024 01:56

241212-cc56vawncv 10

18-11-2024 13:48

241118-q4ed4ayarj 10

15-11-2024 01:42

241115-b4vnrawgnb 10

15-11-2024 01:41

241115-b4c4pswkbz 10

09-11-2024 01:42

241109-b4st6avbme 10

General

  • Target

    eade1332ee8d089e13ff751acecf54b559beadff7e2b23f719eee21ba2d3df10

  • Size

    18.5MB

  • MD5

    bd4dfea472d4fa0e9550f739bd8d04d3

  • SHA1

    c462a46f0ab1243ae616ccb03839e7f90b993315

  • SHA256

    eade1332ee8d089e13ff751acecf54b559beadff7e2b23f719eee21ba2d3df10

  • SHA512

    940cd64aaf9c476fed8d2031db2edc8f626be244ab4f78f392d0e608f93796fdc2d87b0ddd20ec2db0ec29c008f536192da65d2bb31442f34c73142fc3b26e20

  • SSDEEP

    196608:6dZItlOME4gqh+r4R6N8Gb0VKgt0JjLIP6BxP6LOfXAkZ:IJ

Malware Config

Signatures

  • Cobalt Strike reflective loader 1 IoCs

    Detects the reflective loader used by Cobalt Strike.

  • Cobaltstrike family
  • Detected Mount Locker ransomware 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • Gcleaner family
  • HelloKitty ELF 1 IoCs
  • Hellokitty family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Merlin family
  • Merlin payload 1 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Modiloader family
  • Mountlocker family
  • NetFilter payload 1 IoCs
  • NetWire RAT payload 1 IoCs
  • Netfilter family
  • Netwire family
  • Remcos family
  • Snake Keylogger payload 1 IoCs
  • Snakekeylogger family
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • eade1332ee8d089e13ff751acecf54b559beadff7e2b23f719eee21ba2d3df10