Overview
overview
10Static
static
100.46582298...58.exe
windows7-x64
700331dd25b...3a.exe
windows7-x64
10065988f36f...a0.exe
windows7-x64
30826716413...57.exe
windows7-x64
1008cf8ed94c...a4.exe
windows7-x64
100997ba7292...3c.exe
windows7-x64
30b7996bca4...5f.exe
windows7-x64
0c3431dbb8...ui.dll
windows7-x64
50cd7440ca9...bc.exe
windows7-x64
10100b8bfff5...ir.exe
windows7-x64
3101.ex_.exe
windows7-x64
3119.executable.exe
windows7-x64
6119.unp.exe
windows7-x64
611abb44de5...47.exe
windows7-x64
1011fb52c968...22.exe
windows7-x64
10123.exe
windows7-x64
1139.exe
windows7-x64
113E418BF18...73.dll
windows7-x64
3144.exe
windows7-x64
117697e1829...44.dll
windows7-x64
319561b3379...er.exe
windows7-x64
1019ec0d0e51...C5.exe
windows7-x64
71a6bed2aff...f2.exe
windows7-x64
101f210c60f9...40.exe
windows7-x64
101f3509cc11...dd.exe
windows7-x64
1020c6d29da8...7d.exe
windows7-x64
9234e77145d...2d.exe
windows7-x64
10263fc6fc9e...32.exe
windows7-x64
92e0da054d0...23.zip
windows7-x64
9Compenso.P...__.exe
windows7-x64
9301a3f5017...5f.exe
windows7-x64
1030620.ex_.exe
windows7-x64
10General
-
Target
Batch_1.zip
-
Size
13.3MB
-
Sample
241122-cpgn1sykap
-
MD5
19090d44d59052a2c0747280fadc7f92
-
SHA1
25162ddae11d4f21729418d6f5e43c8fd035de68
-
SHA256
e9b99706a9b48b09974dd18c1af8a0e402ccddcaa0c91edf43fdd838128a7408
-
SHA512
9168cb1b97bf680b5be065852486b51c38cd134ec2aebe97bc0a6a4b681a226cf83013e012de1e0402e44369fc6c1ed95068f94ab6e21b4dbba91606f95f9800
-
SSDEEP
393216:17+hcOnO654Z2D2suR0212iUS8EgAoHBM9a6h2BS8uO:EZzuZu5uR0IRnyHBMIvYO
Behavioral task
behavioral1
Sample
0.4658229854220858.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
082671641341d89fe49d0da717846035ba6af02edb59840148eddc3586d21557.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
0997ba7292ddbac1c7e7ade6766ed53c.exe
Resource
win7-20240708-en
Behavioral task
behavioral7
Sample
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
0c3431dbb8cd0478250eb4357257880e_localui.dll
Resource
win7-20241023-en
Behavioral task
behavioral9
Sample
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe.vir.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
101.ex_.exe
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
119.executable.exe
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
119.unp.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47.exe
Resource
win7-20240903-en
Behavioral task
behavioral15
Sample
11fb52c96853e12f011b7b7894e9884e56eb5522.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
123.exe
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
139.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
13E418BF18B03AC80580DB69ADA305A2B7093DFED00692DCF91A99D2526D3A73.dll
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
144.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
17697e1829f0d18d2051a67bc2bca134_da3ded254909e9abaa46eb5bc3b10944.dll
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
19ec0d0e5143940492a1c79c06eb8f18aa9feb356e41b8b79fdc6a16a3bcd7bf_TDS=4F9B33C5.exe
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d.exe
Resource
win7-20241023-en
Behavioral task
behavioral27
Sample
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
Resource
win7-20240729-en
Behavioral task
behavioral28
Sample
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032.exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23.zip
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
Compenso.Pdf______________________________________________________________.exe
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
30620.ex_.exe
Resource
win7-20241010-en
Malware Config
Extracted
C:\FILES.TXT
Extracted
Protocol: ftp- Host:
ftp.free3v.net - Port:
21 - Username:
money8 - Password:
12345678
Targets
-
-
Target
0.4658229854220858.exe
-
Size
126KB
-
MD5
ec9bdf9d0c71f868b65faeaa62140814
-
SHA1
ea38f99ccda904ce132b50126137820fd7cd301f
-
SHA256
8c9d81fc8ca2d32585880f03d979eaf1e689767b6cb6e3fafce12c7821685c1b
-
SHA512
e0f36113f0c053ff308fc5e1bcaaa412067286fc050bf9a199624b8cbd27fea21dc9ae2b2f1b26e5453d66cb2d399d247adf54877fbb47c389bd19be1b47b82c
-
SSDEEP
3072:Z4JEg+pmSenMnxgK1Lb36X1oDKOBCAMva0stvdm+eIWBJPao1o:aJEoSkKx7DKOBXMvHodmSc7o
Score7/10-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
-
-
Target
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a.exe
-
Size
320KB
-
MD5
222bdee5eca9fb8fe2a66f9f9c363c73
-
SHA1
dd361bed6888f6b59db8f579d589ea89598fab23
-
SHA256
00331dd25b83984d4b6d9753fec2b306e88ac87371ea48188df49cb630905d3a
-
SHA512
4a8979354b8c4eb32ac4e62ae3f5bf1dc61a2925e6a9c7e27074b301fe3dd8791b594bbc05adad735deb8bdcdf7b9e476969125903acd1c1af2c6d2863ee5010
-
SSDEEP
6144:skldreTgLp61fV1MQNA0m2MyqmQ6gl+bn0eGWZhHpIE1FUQZCa:HdSTgLp61frpAbyHrD0fWtIGKQd
Score10/10-
Modifies WinLogon for persistence
-
Modifies security service
-
Deletes itself
-
Adds Run key to start application
-
-
-
Target
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0.exe
-
Size
517KB
-
MD5
f9da7dcf28c9e06ef9b2d39467c82f70
-
SHA1
da4b57856503f0a6473aac73a726de0d5c3cb5cd
-
SHA256
065988f36f3ab99ff40893c7ad756cfcc3baea1b8b5217f17cdd6e44160df0a0
-
SHA512
711b20ed66071836b69d1aa1dad2230ac3e470e8bf67e09780f97de93699bc6dfe9c6477b412ac92cbc4bc0e49da613e012f2437633d4149dffe19d946aab939
-
SSDEEP
3072:EhBFivy/l0If89/UZqBNSWadsT4I0iG1BlLjW/2WtCjqTrEOAYSI2SlkHdpVZyn:Oav+0IfYnNoAw/nWuWQqdSBPdpVo
Score3/10 -
-
-
Target
082671641341d89fe49d0da717846035ba6af02edb59840148eddc3586d21557.exe
-
Size
949KB
-
MD5
4f6011ff98c257441ed388c607c5c7fe
-
SHA1
cff8ccf239f9513ee2272c7e710b3d40e4d17ae4
-
SHA256
3d9af2cb75bf685209ca0cfcc84e7ece27a2007044c2dc4b0ddcbc7fb141ad3e
-
SHA512
1951009509dfaeccca69c1d94bd40e8f090174fa106b11f993c8cb5c1df7df345aa07978a1be927a12cf54de397c3379f91ba098d5b9aaa7c47e2fece5fe8329
-
SSDEEP
12288:BuucC/r6vkvt5Bv1s+7+bK6ErCd46hDjHyVqZOf3OD/RC6UE1ygKraRVR8TqjN:EucEa+7ubPxj57/LkrU5
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4.exe
-
Size
727KB
-
MD5
d13f890034a68ccb4af4e0bf51e2b5ec
-
SHA1
84afde24c913c007b0c0490041b61877aa254737
-
SHA256
08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4
-
SHA512
0065844527f3a3556bc50705f9d5608561a04e95a2d99b1a262db1094ca188425ef69f02f801eab2eaf74e14e027ceebb471a754192e195e51b6c57d3d7d45ce
-
SSDEEP
12288:jk2624GHVUBOSRVrHZfiZHJ2HFO/9xwrPgWyzZp+L7vN3:H6+VUBraeF8/tSh
-
Clears Windows event logs
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Power Settings
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
-
Suspicious use of SetThreadContext
-
-
-
Target
0997ba7292ddbac1c7e7ade6766ed53c.exe
-
Size
40KB
-
MD5
0997ba7292ddbac1c7e7ade6766ed53c
-
SHA1
d63ff86f05b6f2fb86abf0dcd16cd2008fa3c158
-
SHA256
3208efe96d14f5a6a2840daecbead6b0f4d73c5a05192a1a8eef8b50bbfb4bc1
-
SHA512
62fa4f721bfc1800044e794bf97a2608640731f03f5b548779b28c4e401c38a4743cf8318a45f96e3d26677449e26b272b59209f3319c5e7a2f5da0584ccf837
-
SSDEEP
768:qqsKtER6RyqAaeN5E62J7hHKr3jzK8zBkTcbI9fN2PjM9J7YoztYcF0Kc6K:qqZQQyqA7wFJ7ZKr3XnaTc8KjmJ5j0KY
Score3/10 -
-
-
Target
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f.exe
-
Size
475KB
-
MD5
27d857e12b9be5d43f935b8cc86eaabf
-
SHA1
ffebffc89a0b417e56dea3fdce962ee54f7ce00f
-
SHA256
0b7996bca486575be15e68dba7cbd802b1e5f90436ba23f802da66292c8a055f
-
SHA512
0898c58b8c69528c37d231a4ab5d83833d7b5235abdff5f94a238824f02fac794e57802cdeac5a39259723ff8cb860831a230300d39ddab390a0b2c93aa7e439
-
SSDEEP
12288:jp429hwR3RIryG/iMTL5IG8FEVVnk0Okn:jD9hwnrhMTGG8FEvk0Okn
Score1/10 -
-
-
Target
0c3431dbb8cd0478250eb4357257880e_localui.dll
-
Size
441KB
-
MD5
0c3431dbb8cd0478250eb4357257880e
-
SHA1
0a1d2182f272ff4e4321b41f6bf65f8320d9e88c
-
SHA256
565dadb36e1d8b0c787d0d5e4cd7ec8c24cac1d6b37637427547ae465ab0fff0
-
SHA512
7d27c8a16d45944532d2f3602b712caf095c030fa3bc3e733cf5e417e368d869c0a40258f2f48143cd81d790ca752a6142d39cefbab940a04382f5363c93f062
-
SSDEEP
12288:O8A22qXSMfxUbFhgRRce5EXxlqI8mG1NU:vA2PCMf6bFkf5YNG
Score5/10-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc.exe
-
Size
1.6MB
-
MD5
16d202aac28076f3c4c1bec60f356f7b
-
SHA1
4d9592f4b3f4ea12b245c531b93082ccfd6fd292
-
SHA256
0cd7440ca94d31212e21867439f38f0828823b76c94d566e81f5dfaf71574ebc
-
SHA512
9f70ed2f374a82fb03d58a22cceb33f1ee8eef7bc8d97bca67c5240aa6b60d201d88415cc2501b635ff53be7fde1f0a08b036a2ffc8d29c5f71b4c0db52deaf4
-
SSDEEP
24576:EFwvcMczi2I0CHpQlDOk0Uig4dMwbQ4Mf7Pgw433naEtl1:EqXczupQbZ4Z8v7PgwwnaE1
-
Drops file in System32 directory
-
-
-
Target
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48.exe.vir.exe
-
Size
308KB
-
MD5
e2982778434438cce87e6f43493d63ce
-
SHA1
1927c6f73714a3d06d379d2bc4693e7a970d5cea
-
SHA256
100b8bfff550fb74c98a2ef9a71d4bb53553d2d7ba509bb451fe32814ec57e48
-
SHA512
47e51150b308109e218949cfe80160706bca06f2ba9b2ffac27e36db35a2ead729766afc09936d020cde20e0678a7c912d1ed59a6295fe9bcceb17f2b12b2248
-
SSDEEP
6144:j09jZMz/y1rekkCkVg+AW93YVfhZR3MM+SYRQlsQc0EJroJ:AXC/FkdkVg9WlufR3MM+PRQvcZ
Score3/10 -
-
-
Target
101.ex_.exe
-
Size
72KB
-
MD5
8ce930987752f9790864543b6da34317
-
SHA1
7d89ae64e1dae59e8e85749b875aa712a4fc5e36
-
SHA256
5bce08b97565564ccdebec5b9c45ac680e0b3f01ddde2461f1dff4a9bbe50836
-
SHA512
456c1eb90d51145a785ee47c15d49b0bc9ce9a14f636bbac69e4df19fb2ab8b6e4f785657797042561e0d12e237fc223537220493d9a4ef3f1b29cda373fb65d
-
SSDEEP
1536:7L7EqNd1A9O75xPIFcQaxXoNzgueHhkKLcjKsMFYM6dN:73h7ecBmxghHxLcjKsHN
Score3/10 -
-
-
Target
119.executable.exe
-
Size
24KB
-
MD5
1d27a7210f54a047264f23c7506e9506
-
SHA1
4116e4e8f34e5e7f3fc6cf23cffd04fb027a1527
-
SHA256
431111e367629bea37db016682c6354303360cd1419c033a22a26115121ccfe9
-
SHA512
077054eb1afbe2fd375d409176b61bdc407c8ef10351b4d00ccdc5c02f87a2f99c319a81baa99d92cd8f0bfd32bdf95b54dc6ea4b288a8dc5d9bec9b08523700
-
SSDEEP
384:ymlG7hWSGNjLmCdCH72JrgITFYDVOElufavSeAE3hbj/hohmg57CtJwjr0n:ymQ9WSGNzdc2iITF1fav7AE3hbj/hohI
Score6/10-
Adds Run key to start application
-
-
-
Target
119.unp.exe
-
Size
68KB
-
MD5
1d79ad8323f4c0d42a5886be05a9c635
-
SHA1
ce40f723074765819876b2ae579d5b1ad78558b6
-
SHA256
fbaa0b9fe6f035b1c466a75f768c6c86da669af72b363de043b4e5339bbbc4de
-
SHA512
77704129642a75c6bba54ad2c174ddf131190e1ed327d9ac57300cb10777f7498712edd66c66be485004717c4bd278d865855072bfed28ca76cd715ebff460b3
-
SSDEEP
768:yRl1JQ56c46jVT+XtVkWVGcPYSh4IwyyFN/yFHiWv6cF/hlL3Yw+oEy4AhmarTr8:2LA6YTzSqrzsFCe/h53Yk4Ak4RBU
Score6/10-
Adds Run key to start application
-
-
-
Target
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47.exe
-
Size
254KB
-
MD5
3fda59bf85d09c340d7146a5c32eee5f
-
SHA1
69199e81914f50dd795ba9cc2732473abaa19430
-
SHA256
11abb44de53807e32980a010a473514694f901841e63ab33f5e0ff8754009b47
-
SHA512
5def471171a85c53643b363eca48e42a477e529ea3dc11fd0cb1585b2d6ae002adbffede6efb7ec36849517704db46e7abfbb349080e203f267ed1aa555be434
-
SSDEEP
3072:2odLe4TZUfOFp17Sm0vizvH1F6BgoUjp1vUO9BuGgcUQDGY8z3YuHR8xHdE:2b4S+1MvyrCvUJ9PUQDGYtdE
-
Blackmoon family
-
Detect Blackmoon payload
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
-
-
Target
11fb52c96853e12f011b7b7894e9884e56eb5522.exe
-
Size
496KB
-
MD5
04eacd2031de21c56ccec496e1b5ed68
-
SHA1
11fb52c96853e12f011b7b7894e9884e56eb5522
-
SHA256
e908284c087983e3b9f3a3b828f1a3812bfe0e77694b9ef943c0e5c90eb747bb
-
SHA512
7951a8a8370c01273ce32c3695d16f496d485641f8a7454a86890abb894be9fed867e66ff57c8313bc10d8afd79e330c6e13936ca2bcb81c2b82bbf23a48799f
-
SSDEEP
6144:H8CL0LckC2bYXES5c+rvM10d+dDJPDCWpKrSgBoreMDLu2zbgVn9Sr/WIInBt5op:cA0LK/5c3aqPiTebDLuibinIrwBtTE
Score10/10-
Modifies WinLogon for persistence
-
Modifies firewall policy service
-
Modifies security service
-
Disables Task Manager via registry modification
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
123.exe
-
Size
2.3MB
-
MD5
498bdcfb93d13fecaf92e96f77063abf
-
SHA1
263d14f535c264aa254fbee0b66e94a32c156a4c
-
SHA256
1b44a3b1dec865a96e44f2b556f19682fd844ebe3e7b0577bd7e58d307fcba4f
-
SHA512
f7f0e29f7eea16a8652b200a93d238fd59ceee281976682ee17ed43565096d4e3e5f73c71d9e4c52fa94bf106fded1f787f97f9b23341525ce26851518241329
-
SSDEEP
49152:gM16E7qEoM5NWX7DP+1egOhcraQzq6j97V:h16/bM5oW1ZrRz
Score1/10 -
-
-
Target
139.exe
-
Size
2.3MB
-
MD5
409d80bb94645fbc4a1fa61c07806883
-
SHA1
4080bb3a28c2946fd9b72f6b51fe15de74cbb1e1
-
SHA256
2ecc525177ed52c74ddaaacd47ad513450e85c01f2616bf179be5b576164bf63
-
SHA512
a99a2f17d9fbb1da9fb993b976df63afa74317666eca46d1f04e7e6e24149547d1ac7210f673caeae9b23a900528ad6ad0a7b98780eff458d3d505029a06e9ba
-
SSDEEP
49152:XM16E7qUoM5NWX7DP+1egOhcraQzK6j97V:c16/rM5oW1ZrRz
Score1/10 -
-
-
Target
13E418BF18B03AC80580DB69ADA305A2B7093DFED00692DCF91A99D2526D3A73.exe
-
Size
603KB
-
MD5
f9e5a0f72d62f5cc2678a1326b91953c
-
SHA1
123f161ca160761dd4ef9f3ecfbba32ce091802e
-
SHA256
13e418bf18b03ac80580db69ada305a2b7093dfed00692dcf91a99d2526d3a73
-
SHA512
f0f237b884fe0b46d51e5ecf853fcd477fe8f39bf830ea36aaa46545d4f456798defc0fa206ea89221a87255adc64b939a2f13df5ab2d2c8e887cfab0aad9714
-
SSDEEP
6144:QuML7/oIlCGJPY2Z2AlptXbgz0+Q4odCGfTnpbEdd/fudqsa0jucQgBMacCGNoE4:GoHEHblpWz0jPLhEfgP6WMDoEiY+L/W
Score3/10 -
-
-
Target
144.exe
-
Size
2.3MB
-
MD5
37c0d7f81f6cb81d50505d9c2d17133b
-
SHA1
177843629cd1dc4345b03e48574eed12d0551ce6
-
SHA256
e141f564003773d4fe3ef462458a041a871699fb7dc646632cf00afac4870779
-
SHA512
d8f5e378d2ecdf12f1e20396c2e60120b1cc91c04e1e1af8860db7c5d96617f586454407361087a704359d39885ba1bfadec61a55d1587065942bcedd9aad4c7
-
SSDEEP
49152:XM16E7qMoM5NWX7DP+1egOhcraQza6j97V:c16/jM5oW1ZrRz
Score1/10 -
-
-
Target
17697e1829f0d18d2051a67bc2bca134_da3ded254909e9abaa46eb5bc3b10944.exe
-
Size
288KB
-
MD5
17697e1829f0d18d2051a67bc2bca134
-
SHA1
d3f6bd8b57a8c353fd3f25d66e0690d9f578d35e
-
SHA256
ab7a58b6e50be6b9bcb926c550ff26669601bbd8bfd922a5b32756e663b25a67
-
SHA512
043807916717c72b2265915fa0a99688946f384286d3bf637646f38b5dcc6860b71c8f4896000d136f7ae18eb808537391f43991234ec25c1700872662ab53e4
-
SSDEEP
3072:g9OePfXFnSzjrF4SAiInBfe54R0nANPJYCWupbjvlx1X2qpOCFIQ4OWd6nWWBSJ/:eVdSzjtAfHRNrW8bjlHIIIHL
Score3/10 -
-
-
Target
19561b33793dcb865eae56575a899ce8_kovter_from_Sakura82_taskmanger.exe
-
Size
119KB
-
MD5
19561b33793dcb865eae56575a899ce8
-
SHA1
aeff444147fb35adbdf4faed6b5c4bd385b1d98c
-
SHA256
d625fcec98e282032f550ba80f60de2603adc9f18dd6ae597defda9df5200bd2
-
SHA512
c1ddaafcd3b8623f446acec01afe763e765e3abf930fe258e6cb728f6c2f68c1cf3c966f12473267628c4d8613b74c68c5369e03a5bbbc3c9db4c0584da0fad1
-
SSDEEP
3072:TphxjSC0KVR9sr6NuO4pTMq5tWkLgQ3+jOJgg3gv/5f6XKk6+/F:Tp7jYKV8+Nhud5dLgDyggE5sKo
Score10/10-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modifies WinLogon for persistence
-
Modiloader family
-
ModiLoader Second Stage
-
Adds policy Run key to start application
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Deletes itself
-
Adds Run key to start application
-
-
-
Target
19ec0d0e5143940492a1c79c06eb8f18aa9feb356e41b8b79fdc6a16a3bcd7bf_TDS=4F9B33C5.exe
-
Size
62KB
-
MD5
4a62e310e45e83b3f5cae161fe1133ea
-
SHA1
941f334a016b8279c40cf8fb4dc972d9cc92d17e
-
SHA256
bc45024fcb7b942ba9ee417c6b949ac5c1f92bb5b07eb5993f17923487080f29
-
SHA512
9b043a4daf425f962fa1eea3191302594c6711b5d6a9e22443b93e2a231b08e3e9714910149661dc1f3ba6ad58f3e32044ab7174f4e30d8651748e4fea39cba5
-
SSDEEP
1536:2F7P2btiVYiZ+TX2tbOH3UqCXOOlIoj6Q849XY:S7ktiPCH3UqZAhRY
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Adds Run key to start application
-
-
-
Target
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2.exe
-
Size
164KB
-
MD5
5f2d13576e4906501c91b8bf400e0890
-
SHA1
adff2761a6afe9ecaa70486c0a04746c676a133b
-
SHA256
1a6bed2afff1b9880e42a29cea9b8139bcb12e34085fb008de13aa983b82a4f2
-
SHA512
29186d7c1702ab738844777a780ce982882727d8fb3ae6e1fd084bffef3ac63fcd7ca4624ee9bf047c909c303deece27f81650b1309280d6609d207e29131dfd
-
SSDEEP
3072:rIynAdou+ZKzVq6yWcp35EMVGv4sbJt0vQP3rmQp:rIKRD6qnnKdvbfm
-
HydraCrypt
Relatively unsophisticated ransomware family based on leaked CrypBoss source code.
-
Hydracrypt family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (453) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Suspicious use of SetThreadContext
-
-
-
Target
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40.exe
-
Size
43KB
-
MD5
c86e6c9a14e2c11428dea7f72805d999
-
SHA1
1e41e641e54bb6fb26b5706e39b90c93165bcb0b
-
SHA256
1f210c60f90fd8403099482455f3220b56b2864bc4d2b6af0abda4a2c3854d40
-
SHA512
32ed8ef777e5d30ae086d6bd05202b94932f6894e25a48c2e92a2e8a77ba80651c45ee04ed0b70831d479a74a2d48af14b40623e59c06223289cb3d4b144576d
-
SSDEEP
768:wO70S7b0vJinmDOxCRfcwt5Dqcjgqa57R/SVcQPnmX5URz7D7PpUmNq:ngawv2PTq5D1jgZ7RKJeJU1D7PpUQ
-
Detected Xorist Ransomware
-
Xorist family
-
Renames multiple (2200) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Drops startup file
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd.exe
-
Size
2.4MB
-
MD5
6e44abb2b449dd0bcadf8b0316590d0e
-
SHA1
332b18785c716091e0dd8e3fa94340fbfb909b93
-
SHA256
1f3509cc11ffa1f7d839df93615cf1ba0819d75cafd5ef59110d9b01fb90addd
-
SHA512
14ba742a4904bb966223006c4f453de5f0a85148910a0f6ead28323a0d106bfb75042458271b3349ceaf416c3a6010fa9edd3f0f4fa388e4c186e3cea25e4187
-
SSDEEP
49152:rOlrKV9RqsFBVhP6zyueenTEpcEwX+6WWZbenMJpRd20/Sd5:6JULqUbhSzyCFu6W8bewf
-
Mimikatz family
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
mimikatz is an open source tool to dump credentials on Windows
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
-
-
Target
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d.exe
-
Size
2.0MB
-
MD5
217c23371f1d91e81beac74a759be045
-
SHA1
7aa2abe3c6d2decee0bd741198a59db9c92d4cbd
-
SHA256
20c6d29da875075afa0ed7b4fb58e555de89d4bed13bf5ad109817c593ddd77d
-
SHA512
5f8f0550b61bfeac6675c7c489cbf5e9d5d85ffe98798499e086d207a63a970aaae81bfb07eed841abff073df2505d6c2e271e01836658d940c6c3e1c62031f5
-
SSDEEP
49152:cbIZw+8h+93HIyboFW0eqqoD5PyyGBrmM/eZzUBSzPayRxcJ:zb3HlCW0eGIy6r//eZAIWyRxq
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Sets desktop wallpaper using registry
-
-
-
Target
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d.exe
-
Size
488KB
-
MD5
cbb57e24964c4f12adc9a2db6b8bcb65
-
SHA1
e968b7fd762475c6eab8cd5b3f32ebc56944d95c
-
SHA256
234e77145d329956192c389249e20520851853e2a33779be93530788201b612d
-
SHA512
2827258fc71966d7e22902d214e97bc8ea1aa982088f0cbf09c8e8a8f71a852ac3206a456a9585bdc17c1755556104e9adfe225432516fb62b029d46a582fc41
-
SSDEEP
12288:UzcRD02J4Sq2vHGB67KWKKmDKLPJ8W2jTAnPhrIh5H:+cRToImoAmLOW2yPhw
Score10/10-
Modifies WinLogon for persistence
-
Drops startup file
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
-
-
Target
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032.exe
-
Size
215KB
-
MD5
f97d91f8aebbce4628664231184af5a1
-
SHA1
19cbbf718826377ae342f7dd1dbee68d5dfb30f8
-
SHA256
263fc6fc9efa4c05a08d9ff1fc7bb060a7b8f376f82afa17fd3fc267bc8e8032
-
SHA512
786a72e6f41d84555061ee1a15dfa68046c5f676ed911ad86303f99d64c607b60f2ba424cefaa2a0ea5e61d9d2aa019b930b150e4d9ab0969c2d1d345aa0f1b3
-
SSDEEP
3072:JwJbQEHr/KGapjJzx15Ggz8DhGljxPaxXoyAq7NlCQ+VInzgYL8V3ZKJb8E1s1e8:eLLYpjzTzqUljx8XrAHY0YYEf4f
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Drops startup file
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23.exe
-
Size
284KB
-
MD5
83c23855e2176eb28b99c25be875c8f3
-
SHA1
6b8ba758c4075e766d2cd928ffb92b2223c644d7
-
SHA256
2e0da054d03fde4e7b2c2057cc4aa410c64b6ab8777ee6d4fd43f031a5170a23
-
SHA512
95f2baf2ecca3e00292f7ffab2a8f28b825c8e3c76589f79a05533c58f44d2b748527e7cd4aed9c486b678832beb26fd940f129f5791f2b2bec213ebb24c73e6
-
SSDEEP
6144:CcQu7L20QOPNMNYKEdf7Q0chT7WbK1xb5Z:920Q1YKMfE06jZ
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
Compenso.Pdf______________________________________________________________.exe
-
Size
446KB
-
MD5
93cbe4ed3d46abe732a124a41e7147a2
-
SHA1
94a24be60d90479ce27f7787a86678472aabdc6e
-
SHA256
89e71eb0a6403725d2f95cb9e6506b8b139a6948a61dc1c5cfedf18648241ec4
-
SHA512
8f46af90d8a2d78da003a8a395fd7f74cc235595238ee3a3e4d87fee2aa4c8abf6ece403bb3726122d3825437f5d079ea1f8d6b275153bb76b3b0d75c243ef09
-
SSDEEP
6144:XOOxeLzWoeNqagVRUvOWcTwlOcTeP8uENXIEQSdO8c/AVxYflxiW:txeHWoA/Wr0lfQ8BfLkIVxYfrd
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f.exe
-
Size
413KB
-
MD5
3023d7526b479ea3df315a5b1779a43d
-
SHA1
b5ae71b96a28b9353a4f33c5370ac18750937c17
-
SHA256
301a3f5017e578fb04b0eb33f45831bb9bb8318020e0a18d222ebea08bf1c75f
-
SHA512
67fe1cf7538e8ef76b6acbba99326af0de58464bf5710ae6fa7b85d73da9a84c58122de6b87c7d9560f0d366de711a95d03be231c1018eacb7489fd32aeb0834
-
SSDEEP
6144:OpZsqlbu151gFomsCfv6hdgnkG6FSXrIiucY6/4sTj3GUcqcPVpNghCQ:Ussu15qlsmShRG6mIiucN42qxqcC
Score10/10-
Modifies WinLogon for persistence
-
Modifies security service
-
Deletes itself
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
30620.ex_.exe
-
Size
102KB
-
MD5
2b0d89587b59313e26ca8a5fb54db196
-
SHA1
7e171b08b1ce0b40de8bb6192e957d603deceb00
-
SHA256
e7fc8300fd164ec248ffde850e6cc73a9a010973828326f3f7ea57d828ee3199
-
SHA512
d89052e9a170b122cd4a218b060a12908a6e73debe63ac5c960c4d750b2861af19c27b7ba4eef2a77d543bfad10ea4b37f749348e8b13f7bb6849686bb5c4168
-
SSDEEP
768:iWXJzWpHKhNXP6rtm21qGyNhB0FlwR7YMBMzjdopFkkD8EDW1nDceWzaS3PvSVkI:7JzWp2NXS5m21SBpRnMzjdCkgcDcFz
Score10/10-
Modifies WinLogon for persistence
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
3Windows Service
3Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Direct Volume Access
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
5Disable or Modify System Firewall
1Disable or Modify Tools
3Indicator Removal
4Clear Windows Event Logs
1File Deletion
3Modify Registry
11Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1