Overview
overview
10Static
static
100486218577...d9.exe
windows7-x64
109bfd15145...11.exe
windows7-x64
9141d93e2d4...aa.exe
windows7-x64
1016c2807567...55.exe
windows7-x64
32f41c73046...95.exe
windows7-x64
103e275093a5...01.exe
windows7-x64
10419a809f42...89.exe
windows7-x64
34b10fd0d5e...58.exe
windows7-x64
104d78c439ed...f7.exe
windows7-x64
74f7713dcf8...63.exe
windows7-x64
7597deecbe6...4d.exe
windows7-x64
76b59edf464...e8.exe
windows7-x64
87def3cd43d...d8.exe
windows7-x64
796ba85326e...8a.exe
windows7-x64
797f1b6afb2...2e.exe
windows7-x64
59906747639...1e.exe
windows7-x64
19e1609ab7f...08.exe
windows7-x64
10b7fc91fc1f...37.exe
windows7-x64
7bf179bbd2c...25.exe
windows7-x64
3cfc68c40f4...4f.exe
windows7-x64
6e6e948a0aa...eb.exe
windows7-x64
1f02fe52119...68.exe
windows7-x64
8$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows7-x64
3secrehosted.exe
windows7-x64
3General
-
Target
Unique_Icons_But_Unknown_Malware.rar
-
Size
55.8MB
-
Sample
241127-lfrx3atrgr
-
MD5
9482d0b143b8cc0cb39c5caa948b965d
-
SHA1
f9e48d067999bbfb827cd94976c7a73b52719ff8
-
SHA256
abff8ad79e497aeb5787012b0b0b718324e98bff7e703071c9fe75d6e534b6d6
-
SHA512
5f00aa543d0073ad1db5b2b6a008d98f6c4e585aea93aff7eb492aa46a7f0c536abff669757063d6d7c7131d1e0dd618391561ec453f09e2196168a27406d1a4
-
SSDEEP
786432:4SHD1JF9dWPBvk7bpHaiT0MYV5WsP9tF7BV/KPgLZroAqmJZpC+uGixVM:4UDZ9dvd6HXXn9PKP0lFvC+unLM
Behavioral task
behavioral1
Sample
04862185775476ae0b6f7e8a02133cb408d212ca17bbff5c20dcfdcf569b3dd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09bfd15145c9d8e39f99d3dfe98337a8c488dc334dfe195d27bdeb5b2459fd11.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
141d93e2d408738bba4f523f60d6ead702424e7d62c34921c8a34150a31870aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
16c2807567b31c30288d92c0649ce78ea87434104bac72db407bb45bf65a4855.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
2f41c73046f3b0f5edd79ae089b6b64ec3a0812ea02fe7325b8e5b171a621c95.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
3e275093a5ad4b2083eda47dfd2e9053cae044f7990a323c6f649093a8d00901.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
419a809f42361b2fcff98eb6f201e54ecef532c9b378db06e999f54285032889.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
4d78c439ed8860a14aebcf79dfef27047a51fc36c514b40b48724cd9340ff6f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
597deecbe673c67d998825bdf4ddeca83f6fbb3bdccec91dabf4f9052713ac4d.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6b59edf464eaaeac4f4b2f43474e573694429f08c448db770618dc574b6171e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
7def3cd43d98a30a04f09be284cab8b8dbf96ecc2e78302f6c45ad524c41d7d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
96ba85326e2250f4e1cf07f5981bb96ea1383901663a6354899b5da0cd77b98a.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
97f1b6afb24cda22203275fc34bd07ba51170729edba8ee67bdb66a529574a2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
9906747639b782d738555a2522acd4a09ca8a3356f7848a4e68f284d888d891e.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
9e1609ab7f01b56a9476494d9b3bf5997380d466744b07ec5d9b20e416b10f08.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b7fc91fc1fa6a53b1e5d97e21a7abefbde3ca7349d4db0fdbe15ec2702b1b737.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
bf179bbd2ce7ca31e421334efa7d262e30dc16b9bb5cced1b8b18d119adc4425.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
e6e948a0aa3605bbd636ccdfa56e771dfebafa1e150d84f96b1968f8803edbeb.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
f02fe52119ff47fed2e52b28ec2c42a8eae8233b4c588c310dbaef3297b5d768.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
secrehosted.exe
Resource
win7-20240903-en
Malware Config
Extracted
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Info.hta
Extracted
emotet
Epoch2
24.196.49.98:80
93.147.141.5:443
72.189.57.105:80
91.250.96.22:8080
37.187.72.193:8080
104.131.44.150:8080
167.71.10.37:8080
27.109.153.201:8090
105.247.123.133:8080
190.12.119.180:443
120.151.135.224:80
221.165.123.72:80
103.86.49.11:8080
178.237.139.83:8080
5.32.55.214:80
95.213.236.64:8080
189.203.177.41:443
78.24.219.147:8080
190.117.226.104:80
73.11.153.178:8080
195.244.215.206:80
192.241.255.77:8080
24.105.202.216:443
50.116.86.205:8080
41.60.200.34:80
70.175.171.251:80
182.176.132.213:8090
45.51.40.140:80
201.184.105.242:443
47.180.91.213:80
159.65.25.128:8080
173.21.26.90:80
79.159.249.152:80
66.34.201.20:7080
62.75.187.192:8080
180.92.239.110:8080
178.153.176.124:80
115.95.6.218:443
24.94.237.248:80
181.143.126.170:80
210.6.85.121:80
197.89.27.26:8080
98.30.113.161:80
201.173.217.124:443
98.174.166.205:80
91.205.215.66:443
2.237.76.249:80
92.222.216.44:8080
209.97.168.52:8080
200.21.90.5:443
66.7.242.50:8080
5.154.58.24:80
31.31.77.83:443
59.103.164.174:80
37.157.194.134:443
110.36.217.66:8080
46.105.131.87:80
181.126.70.117:80
209.146.22.34:443
160.16.215.66:8080
5.196.74.210:8080
190.146.205.227:8080
169.239.182.217:8080
190.220.19.82:443
121.88.5.176:443
104.131.11.150:8080
190.53.135.159:21
200.116.145.225:443
47.6.15.79:80
87.106.139.101:8080
91.73.197.90:80
24.164.79.147:8080
139.130.242.43:80
62.75.141.82:80
58.171.42.66:8080
62.138.26.28:8080
211.63.71.72:8080
190.117.126.169:80
47.6.15.79:443
78.189.180.107:80
173.66.96.135:80
108.191.2.72:80
47.156.70.145:80
183.102.238.69:465
46.105.131.69:443
64.53.242.181:8080
78.186.5.109:443
205.185.117.108:8080
201.229.45.222:8080
209.141.54.221:8080
110.142.38.16:80
110.143.84.202:80
70.169.53.234:80
98.156.206.153:80
85.67.10.190:80
78.142.114.69:80
179.13.185.19:80
120.150.246.241:80
223.197.185.60:80
139.130.241.252:443
88.249.120.205:80
206.81.10.215:8080
31.172.240.91:8080
206.189.112.148:8080
72.186.137.156:80
104.236.246.93:8080
186.86.247.171:443
45.33.49.124:443
105.27.155.182:80
176.106.183.253:8080
177.239.160.121:80
95.128.43.213:8080
47.153.183.211:80
149.202.153.252:8080
190.55.181.54:443
87.106.136.232:8080
37.139.21.175:8080
60.231.217.199:8080
108.179.206.219:8080
87.230.19.21:8080
70.46.247.81:80
217.160.182.191:8080
188.0.135.237:80
Targets
-
-
Target
04862185775476ae0b6f7e8a02133cb408d212ca17bbff5c20dcfdcf569b3dd9.exe
-
Size
633KB
-
MD5
54d2510dce5b4d827388d60df115b148
-
SHA1
dbdcfb4e9d929749027e14fa1fa78dae281d4f00
-
SHA256
04862185775476ae0b6f7e8a02133cb408d212ca17bbff5c20dcfdcf569b3dd9
-
SHA512
36dd1d765d034b19b2e81eead484fcc562430894f953e0e2e913cf47e917b2b9d102a0c273ec9febe6ab1f654b9d3fcf81c3acc7522fcbc17e92149399c01c6d
-
SSDEEP
6144:yP1SPCRMshMX8pU+E0zyvGJm8v9UDHO1lxAk5C1K4kzRNDa0/C+Lf61Znj:IzPpU4J6unxAKFRFfC+LiDj
Score1/10 -
-
-
Target
09bfd15145c9d8e39f99d3dfe98337a8c488dc334dfe195d27bdeb5b2459fd11.exe
-
Size
765KB
-
MD5
500ef53924b722ddb43632b0dd9070c9
-
SHA1
daf44813ae7f0792ccb3640cd4c700193daf6cf4
-
SHA256
09bfd15145c9d8e39f99d3dfe98337a8c488dc334dfe195d27bdeb5b2459fd11
-
SHA512
f7ace2a8e018ef576e98221b60ac9e99477b2e5ef7f323147c9f90c3f9a1639cd778eca4558491a2c4217001d52377fa8ec5ac2732ee362221c34c69c7610216
-
SSDEEP
12288:Xl26S0vAcB+UwoVSidDHeeIJoCnVRWJvdKLv8S2cZtWkHCmTBQk9TfXX4Jy0Ro0Y:VlS2jgvkTee8VRWJVKLvR2cbWaHTPXqy
Score9/10-
Renames multiple (3024) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
-
-
Target
141d93e2d408738bba4f523f60d6ead702424e7d62c34921c8a34150a31870aa.exe
-
Size
694KB
-
MD5
69d1816b669117f2bd58c44c3395d781
-
SHA1
4eb14f9bb555143671faef063da7f518a7493d94
-
SHA256
141d93e2d408738bba4f523f60d6ead702424e7d62c34921c8a34150a31870aa
-
SHA512
ea097012b4e0729e81f725b437c4b3d650b152ede8e7e27df3615941bbbd2c75346d1b51eb9308531343bd6d1bb6b553015a5805c964c61bc7372862a950806f
-
SSDEEP
12288:Dmrvzqs6OZxzLogi93gAuEaw5hMlvN79yb5wdhuEvKcpK85DOMJb4zzlj:Daqs6OZxzLogivMl7bvjpK85DOM+zl
-
Dharma
Dharma is a ransomware that uses security software installation to hide malicious activities.
-
Dharma family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (321) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops file in System32 directory
-
-
-
Target
16c2807567b31c30288d92c0649ce78ea87434104bac72db407bb45bf65a4855.exe
-
Size
568KB
-
MD5
90b53ba29d2aa7f436059ef1103c2130
-
SHA1
db8a3b842a830e72bb4f067dd88aea76010d0704
-
SHA256
16c2807567b31c30288d92c0649ce78ea87434104bac72db407bb45bf65a4855
-
SHA512
fec790d618aa41cdb88fc407c3ddc5d652c103dbc65c9ae94edfd554a6a45d81352bf907e259fcb359eb29c7d4412f884337c3a14cb38516a280d3b554c4eb81
-
SSDEEP
12288:zNftIXXgD3gyO7Ibi/yQ0pF+T3r+ZgzGd5:zNfWXXgDWIbikpFy3rId5
Score3/10 -
-
-
Target
2f41c73046f3b0f5edd79ae089b6b64ec3a0812ea02fe7325b8e5b171a621c95.exe
-
Size
1.5MB
-
MD5
b8f887a092b6bdcb1bd882e35164d1d7
-
SHA1
08152f67bf925a7478312d45a67f33116a6097b3
-
SHA256
2f41c73046f3b0f5edd79ae089b6b64ec3a0812ea02fe7325b8e5b171a621c95
-
SHA512
057b60f71a84c51d3112e553164d4a476f9488bd1369cec4405975b8cece83fe29d58342bd02ad17542ca1e38254f05dadca027ecbeb281d3b94ff198517dff7
-
SSDEEP
24576:7zwwr/TK4y3+HaxwUsgdYNLhzEnmfp499VYn6nTtEpR59qUN0i6OtH:78wra+ksgdYNLhYmfpaVYn6nTMR59VSi
Score10/10-
Jigsaw Ransomware
Ransomware family first created in 2016. Named based on wallpaper set after infection in the early versions.
-
Jigsaw family
-
Renames multiple (1973) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
3e275093a5ad4b2083eda47dfd2e9053cae044f7990a323c6f649093a8d00901.exe
-
Size
583KB
-
MD5
74d4e0e6dcf5cc7942c35e630036af0c
-
SHA1
c7c4bb3907344aed022d181eb73f8fd812e06f88
-
SHA256
3e275093a5ad4b2083eda47dfd2e9053cae044f7990a323c6f649093a8d00901
-
SHA512
110bb901dacc153fb484673fd033d2c0f9a3f7cbfd73a46f54c44c1f699796844b68db5a860cbbb5be08c03f4ad9dfcd25feb71fc8a9b37445e137a002e6a8eb
-
SSDEEP
12288:5D+7m+CQXYm2o0PTYRPA6PHoVhVtknag6g6n+9iuE5vt+PC3H8H:I7mYRyGA6PIzVtknRJ6notmH8H
-
Detected Xorist Ransomware
-
Xorist family
-
Renames multiple (35894) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory
-
Manipulates Digital Signatures
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in System32 directory
-
-
-
Target
419a809f42361b2fcff98eb6f201e54ecef532c9b378db06e999f54285032889.exe
-
Size
1.5MB
-
MD5
cfc9c44d0b4c399d84f24402ddd8394e
-
SHA1
c7fbb886991a6ecb68ccd32906361caab21610f5
-
SHA256
419a809f42361b2fcff98eb6f201e54ecef532c9b378db06e999f54285032889
-
SHA512
041834ef114ab6422ad3fdc8754b4dc62c2e6e96f6773cf8e0a9d7cd1da3c691da5a33edd429beee3e4d6a36bf38d9f6897e0ef026ec7e1b28881e13a5597b84
-
SSDEEP
12288:MHovgGspGZU+CaVy+AQVlR7Ud91D/rSCBaN6B11wIg/1vBLPHjFlWE7hnFI9q1U:dvt5CagTQVPO1LrfBk6BII83nWElr1U
Score3/10 -
-
-
Target
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe
-
Size
624KB
-
MD5
b9ea663ffcfe1152bd6e9a452a4eaf14
-
SHA1
e45d164dfab4898baefa313ee53c360a7e850f30
-
SHA256
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358
-
SHA512
8fb37dc3ad80f46e83785988037a6f1801e4f326f23b1584bb3b3b4e58d7a489b55322e8ba2a8eba4ab627462802aadb83c3f392c6b3f4f32f0741ee675c0c5f
-
SSDEEP
6144:hzTCYruA1ohrPv8FG0+DVg5w83gSkdwPU0YnG3Fx+GaJ5674pIbVg73zf7ewvNwq:hzBCAnFfG83qEU0YGTcJ47Fmreu+Du
-
Emotet family
-
Drops file in System32 directory
-
-
-
Target
4d78c439ed8860a14aebcf79dfef27047a51fc36c514b40b48724cd9340ff6f7.exe
-
Size
6.5MB
-
MD5
14b6f391b8983ee29eae1b12046198fe
-
SHA1
7151e86314dc13dbbe1c933e561657a5f0659d8f
-
SHA256
4d78c439ed8860a14aebcf79dfef27047a51fc36c514b40b48724cd9340ff6f7
-
SHA512
f40ff4c506f17e9f387921e7c57bf518cc668a3f2bf57a5e71ddab12e17f1bc179d55dcbd2bbfcd6b4d805064e9af6481c54ceb254d203485e52cae9c5c6d5b9
-
SSDEEP
196608:RXYF+gp1DM9onJ5hrZER9xQ3jo4UR7+OjPw:mpNM9c5hlER9xA2RSOj
Score7/10-
Loads dropped DLL
-
-
-
Target
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe
-
Size
5.7MB
-
MD5
ef8e29925a165755db235f31092eb5e6
-
SHA1
3bae3a4c18c7d8baf0fca9b0a5e58b7785f33123
-
SHA256
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663
-
SHA512
5ae5e1fa3bc54431dad5cfb16ea14ac7ac203265197af9ad181d0362dee248cd2e9de18da71a5712e97522c2eb3fa5c24629ebd418b2aadcc32c694237bc2200
-
SSDEEP
98304:yVWEpMFhfhIp8WIs6d0xCNj3DeoWhoWEEN2F5qh27OkgnQxdT6/dsjNUoWUP9O:zB1IdIs6dNN2oIoWEn/qhNk0H/dsaI9
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
597deecbe673c67d998825bdf4ddeca83f6fbb3bdccec91dabf4f9052713ac4d.exe
-
Size
838KB
-
MD5
b4f28f47e2115e7a578761f2d38fd079
-
SHA1
7bf97badf3eb26218bb13bfcafc30c956d18b56f
-
SHA256
597deecbe673c67d998825bdf4ddeca83f6fbb3bdccec91dabf4f9052713ac4d
-
SHA512
3fdc3bce35d80bd91dbbe816fd05be613cb1d5a2b2a234d0d0c7f862289b3f9ef5413c682f981d66df1ef0347e0b7f342d302aee52fa97d07b585442d2daf637
-
SSDEEP
24576:0y4sIMHgxyMCQW0zAqK1vaNOIEDTuy+Bt:KDMHgx/CQW0cqMva8IEDTuyc
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-
-
-
Target
6b59edf464eaaeac4f4b2f43474e573694429f08c448db770618dc574b6171e8.exe
-
Size
536KB
-
MD5
11f3f3382708bc7235e4d72130bc16e4
-
SHA1
165459297e28175a41690fcf5f71642018a438c4
-
SHA256
6b59edf464eaaeac4f4b2f43474e573694429f08c448db770618dc574b6171e8
-
SHA512
0ccfd5ddbdc2b86d39a4e18bfeb9ef29e5ea4f904aa40f148eb761aa82f8d45a7c6c81fce09dbd8b605a96446b0c8d5eea07496fb52053c6404c5f92e3a3de32
-
SSDEEP
12288:kpKKP6WRDw6hPGUIrPiqK6UIrPiqK9h4u0hyZPAF:49PFdw6h+xjJRxjJj8P6
Score8/10-
Disables Task Manager via registry modification
-
-
-
Target
7def3cd43d98a30a04f09be284cab8b8dbf96ecc2e78302f6c45ad524c41d7d8.exe
-
Size
6.5MB
-
MD5
145d87e44b5607f5cbe102d1f5afe333
-
SHA1
62f3e3e1535a1955853f4c2628cf31d99197bf1d
-
SHA256
7def3cd43d98a30a04f09be284cab8b8dbf96ecc2e78302f6c45ad524c41d7d8
-
SHA512
6edabdff5cb316045f20e4de4334e5e6f7aa2909436b94cd4da6f34929682caec31c6e4bdab1992399e9a97c48c51dd4ea2228c055bf523e9a661c710bdb5b4c
-
SSDEEP
196608:LrJnLa9onJ5hrZERVM+ENFJzFcguwW+W7THsC3k:NG9c5hlERVMRFJzFcgupl7TN
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
96ba85326e2250f4e1cf07f5981bb96ea1383901663a6354899b5da0cd77b98a.exe
-
Size
6.7MB
-
MD5
09ed7ffe72f67fe9d02df3d31ecaf9c2
-
SHA1
fd9d56bb3d30986e41c12db7652dc6ade26bafe7
-
SHA256
96ba85326e2250f4e1cf07f5981bb96ea1383901663a6354899b5da0cd77b98a
-
SHA512
fdc4ded62ee81705cebab17b577ee63f404d230bd6f3fc9f5e08c671ce5bd0b0d643779dc351c2ecfa03394d59055992bcda907d6b2ce0cb1f9e2bf2c92497d9
-
SSDEEP
196608:wCHgeIs9onJ5hrZERlyiU8AdZYJERurTbqGnNqbm:is9c5hlERJAdZYygrvqG
Score7/10-
Loads dropped DLL
-
-
-
Target
97f1b6afb24cda22203275fc34bd07ba51170729edba8ee67bdb66a529574a2e.exe
-
Size
9.9MB
-
MD5
35c38b54ec41899c417ec3fcb06cccf4
-
SHA1
3dd53581b2120c467191267f23f021d9d939d899
-
SHA256
97f1b6afb24cda22203275fc34bd07ba51170729edba8ee67bdb66a529574a2e
-
SHA512
58010a01088e2817f278ba9c5dd3dc6e05f21c33d1d45797d170b712fdf183eccbd4d6eaee58f73b5eb79fc04b39089fc543cf60be259b62fab1a425ddd3eec4
-
SSDEEP
196608:UQBQji8WWzNfmRUJbeq/gEY8OA33+yzzRZa/viMRLpMXBMJTybG:NB06gNfuUB7/gk33+sz7KpRVGGJTWG
-
-
-
Target
9906747639b782d738555a2522acd4a09ca8a3356f7848a4e68f284d888d891e.exe
-
Size
577KB
-
MD5
0a305e53c26f277a2afeb9cf4541f756
-
SHA1
be05166cf743ca175fb5a31ffefd384e4793ee76
-
SHA256
9906747639b782d738555a2522acd4a09ca8a3356f7848a4e68f284d888d891e
-
SHA512
677eb1db78cdcd19d1048669e9217d635454e0bf23c9577ef569e13a116526847663cba777e5f22f1b0466ea317fe406c5b3a1801ab3063a0892ad68abfca5f5
-
SSDEEP
12288:LBEZRnbrET0OeW5fw0q1Ybwv98ic+cy3GBX:LBmEYEVw0qTe8GX
Score1/10 -
-
-
Target
9e1609ab7f01b56a9476494d9b3bf5997380d466744b07ec5d9b20e416b10f08.exe
-
Size
1.3MB
-
MD5
70117cfb0d652621da77c47c952fb81a
-
SHA1
3d841739fd18d02612851c10684631ddcdbc442c
-
SHA256
9e1609ab7f01b56a9476494d9b3bf5997380d466744b07ec5d9b20e416b10f08
-
SHA512
abaa63d29588b5fdd5fdc99b1a9eeeeb5ec32416b24054ea5111d960c483492e8b76fd5652d32d8bf6380a7a803916e3009c90ffae9988bee6c4f09b4b7a71d8
-
SSDEEP
24576:nTSTiRsBE12BIVpT2QhYpAILUo/g9QZqpMC3QVbIoTdWR8SfEuGujqZF13z8H81:nT7RseZDT2tSbvQsIbe8YVjPH81
Score10/10-
Detect MafiaWare666 ransomware
-
MafiaWare666 Ransomware
MafiaWare666 is ransomware written in C# with multiple variants.
-
Mafiaware666 family
-
Renames multiple (99) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s)
-
-
-
Target
b7fc91fc1fa6a53b1e5d97e21a7abefbde3ca7349d4db0fdbe15ec2702b1b737.exe
-
Size
6.7MB
-
MD5
80ed1719d442fc2171378203cf4a18d9
-
SHA1
460e8fe2a7cc6ce2ad7fce8efa646309c83b0f2d
-
SHA256
b7fc91fc1fa6a53b1e5d97e21a7abefbde3ca7349d4db0fdbe15ec2702b1b737
-
SHA512
a682fe3b247dca16b11329264749ce8f5fe3a9742dde70e19edff5eb72f0399f0502965c1bdea02d80428c989ccffba399146e27899ca79a16e49a44bde5468b
-
SSDEEP
196608:Wpl+gp1DM9onJ5hrZER9xQ3jo4UR7+cOKcAYuO:y3pNM9c5hlER9xA2RSccA
Score7/10-
Loads dropped DLL
-
-
-
Target
bf179bbd2ce7ca31e421334efa7d262e30dc16b9bb5cced1b8b18d119adc4425.exe
-
Size
1.7MB
-
MD5
3a7ee11b5c67258e478c564b6a54f3d0
-
SHA1
fc7448b0e35688c3181b71d41f7f0eb86ad23f09
-
SHA256
bf179bbd2ce7ca31e421334efa7d262e30dc16b9bb5cced1b8b18d119adc4425
-
SHA512
16e88c8095167279736b71074414a7598e3d7b776239f90fe1d6607886f176bc15eebd7cb7233f474455de4b078351f8691fdc94d47d5cbde0052de8f463036c
-
SSDEEP
49152:kHftXHrT6Qdbu/OUlYF+E7UAQndLI8oOHxPKalwx:k/t3f6QdbbUlYkzAQd8WxCaU
Score3/10 -
-
-
Target
cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
-
Size
595KB
-
MD5
dedb7d290dc95b76d6daf34569d25522
-
SHA1
7bc1c4e3ca288a096ef9abb347238e904970a955
-
SHA256
cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f
-
SHA512
bfae90fa15abd4513869f55a8b51501da68222b3475fdb77292130fa6da32c025983d5715e12572a8083f1f758336032483ec7cb9a388875e106105d7c6e2ac2
-
SSDEEP
12288:egYqC/dIVYS1QYMHy4Ijd1jF4sjMUUWp+GIMHg:hodIVyYMS4IjTljcO+hM
Score6/10-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
-
-
Target
e6e948a0aa3605bbd636ccdfa56e771dfebafa1e150d84f96b1968f8803edbeb.exe
-
Size
853KB
-
MD5
4df094b7a875e5d2e7cb634752cd951d
-
SHA1
c088d58529b77f6670891f9ebb7af80da830c9ce
-
SHA256
e6e948a0aa3605bbd636ccdfa56e771dfebafa1e150d84f96b1968f8803edbeb
-
SHA512
a932b3ca31cf5457d73f9d73429610c24fafd60e69ce849e0e3de7e4ab1ffe464ba40182d903b8f7dd7f80202587be81871d8a5dfec7a4da2d030eb67d63872e
-
SSDEEP
12288:Btu7UAD3Qlp2MtIaM2QVA2DrYrgMDvsu/UJHI20KoGIVlGiL:T+V3ap2pDsPvsu/UJHTkF
Score1/10 -
-
-
Target
f02fe52119ff47fed2e52b28ec2c42a8eae8233b4c588c310dbaef3297b5d768.exe
-
Size
6.6MB
-
MD5
466b6ffd9a2098925c8727c60099626f
-
SHA1
9b1bef96aa713e21b0946506e2fcb6cede4bfc0b
-
SHA256
f02fe52119ff47fed2e52b28ec2c42a8eae8233b4c588c310dbaef3297b5d768
-
SHA512
005b6feed62de8a274ba5f2ef7904a0263e513dee18995a04cc4b5fbb746bc094bfd06f56f4aa8ef5e89793bc958a37d1bdb0c57327dae437f1ecb36b4534307
-
SSDEEP
196608:wjB8ZML/cWcIjvuK7qtigyegsZPc+3ZGe74rb8cWEDc:wjB8Z6cOv17qisRXcPWE4
Score8/10-
Creates new service(s)
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/nsExec.dll
-
Size
6KB
-
MD5
b5a1f9dc73e2944a388a61411bdd8c70
-
SHA1
dc9b20df3f3810c2e81a0c54dea385704ba8bef7
-
SHA256
288100583f65a2b7acfc0c7e231c0e268c58d3067675543f627c01e82f6fd884
-
SHA512
b9c8d71b5da00f2aff7847b9ec3bd8a588afeb525f47a0df235b52f7b2233edb3928a2c8e0b493f287c923cc52a340ad6fee99822595d6591df0e97870de92a8
-
SSDEEP
96:p7GUxNkO6GR0t9GKKr1Zd8NHYVVHp4dEeY3kRnHdMqqyVgNQ3e:lXhHR0aTQN4gRHdMqJVgNH
Score3/10 -
-
-
Target
$PLUGINSDIR/nsProcess.dll
-
Size
4KB
-
MD5
05450face243b3a7472407b999b03a72
-
SHA1
ffd88af2e338ae606c444390f7eaaf5f4aef2cd9
-
SHA256
95fe9d92512ff2318cc2520311ef9145b2cee01209ab0e1b6e45c7ce1d4d0e89
-
SHA512
f4cbe30166aff20a226a7150d93a876873ba699d80d7e9f46f32a9b4753fa7966c3113a3124340b39ca67a13205463a413e740e541e742903e3f89af5a53ad3b
Score3/10 -
-
-
Target
secrehosted.exe
-
Size
6.7MB
-
MD5
c1b7d5a866e2c21c7bc6222328638cfc
-
SHA1
3c09adc17b23ec529951d467481afd495d227cdc
-
SHA256
0cedeb6633fdc8079cde76d2cc72bf98f0496c0dd644a7f215e59014b3dc5f4b
-
SHA512
7e47ea282cb82f003c92565ff9dc9d1cfcdbeeecd8668565eaecd4ef99e609083b3a0192bf01e8e13b467b53e266157cb61cc13c77f1ad169cec1cd141a28814
-
SSDEEP
196608:3YvW2URVICtO4SS2khNmunJI036/n+WWYBB:qWDkC8kTHKPQYP
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Indicator Removal
2File Deletion
2Modify Registry
2Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1