Overview
overview
10Static
static
100811cf7c27...de.exe
windows7-x64
90811cf7c27...de.exe
windows10-2004-x64
90dd0b31f05...24.exe
windows7-x64
70dd0b31f05...24.exe
windows10-2004-x64
71ad888606f...e0.exe
windows7-x64
31ad888606f...e0.exe
windows10-2004-x64
31c77a07e45...95.exe
windows7-x64
101c77a07e45...95.exe
windows10-2004-x64
1023f1c183af...bc.exe
windows7-x64
1023f1c183af...bc.exe
windows10-2004-x64
1038e891599d...90.exe
windows7-x64
1038e891599d...90.exe
windows10-2004-x64
103a13e092e9...db.exe
windows7-x64
43a13e092e9...db.exe
windows10-2004-x64
43b9dabd99d...82.exe
windows7-x64
33b9dabd99d...82.exe
windows10-2004-x64
358fe9776f3...06.exe
windows7-x64
1058fe9776f3...06.exe
windows10-2004-x64
105ab93bd422...11.exe
windows7-x64
35ab93bd422...11.exe
windows10-2004-x64
36b06c25fc6...43.exe
windows7-x64
106b06c25fc6...43.exe
windows10-2004-x64
106cc8001c9b...07.exe
windows7-x64
16cc8001c9b...07.exe
windows10-2004-x64
173ca5dd6d4...3f.exe
windows7-x64
1073ca5dd6d4...3f.exe
windows10-2004-x64
107b931d48ea...f0.exe
windows7-x64
107b931d48ea...f0.exe
windows10-2004-x64
107d6892645b...0f.exe
windows7-x64
107d6892645b...0f.exe
windows10-2004-x64
109036aeb570...7e.exe
windows7-x64
39036aeb570...7e.exe
windows10-2004-x64
3General
-
Target
Unique_Icons_But_Unknown_Malware_2.rar
-
Size
2.3MB
-
Sample
241127-ltejwsykgx
-
MD5
5d4b7054cd11fb441757a5c52e41759b
-
SHA1
08956bd2dff30ecc33f7489ab9c1a8c142812e6c
-
SHA256
fa3f7a4c1502f499a481b56f5e7c185876626e3d00110d84e09652f98b776aff
-
SHA512
96fab5476cd758aa76c683810e485ae0adcdcbc9938f33ff71968367ef4664d62a79975cde6e5071427135a5073f11c1f55b36b73f88d86b96dcfd3e0ba13122
-
SSDEEP
49152:kdXUkI/XI52rHPNoZ/jV3DcVVcgGTYWLanJ6:aXk/IAzPMxDcVM8WLaJ6
Behavioral task
behavioral1
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
njrat
0.7d
HacKed
cheat12.ddns.net:57
a412988a99c974058615f1975119a5d1
-
reg_key
a412988a99c974058615f1975119a5d1
-
splitter
|'|'|
Extracted
blacknet
HacKed
https://xblackeyex.000webhostapp.com/blacknet/
BN[SNqrYexG-0655563]
-
antivm
false
-
elevate_uac
false
-
install_name
svchost.exe
-
splitter
|BN|
-
start_name
17d5d9a29524a220af2c5580f0145c42
-
startup
false
-
usb_spread
false
Extracted
pony
http://butterchoco.net/admin/bull/gate.php
Extracted
gozi
-
build
217161
Extracted
gozi
3170
oozoniteco.com
cetalischi.com
duvensteut.com
-
build
217161
-
dga_base_url
constitution.org/usdeclar.txt
-
dga_crc
0x4eb7d2ca
-
dga_season
10
-
dga_tlds
com
ru
org
-
exe_type
loader
-
server_id
12
Extracted
F:\$RECYCLE.BIN\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/882e0978d5b5a724
https://mazedecrypt.top/882e0978d5b5a724
Extracted
F:\$RECYCLE.BIN\DECRYPT-FILES.txt
maze
http://aoacugmutagkwctu.onion/86ec097af9e9ce11
https://mazedecrypt.top/86ec097af9e9ce11
Extracted
guloader
https://drive.google.com/uc?export=download&id=1pWIXSVxobqZoSDMKYuItyAIYUIZhxr8a
Extracted
http://frameupds.info/rwrw66/2222z.php
Extracted
http://frameupds.info/rwrw66/1111z.php
Extracted
crimsonrat
172.245.247.112
Targets
-
-
Target
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de.exe
-
Size
258KB
-
MD5
54465f04a6075b8e68f272d09b243e81
-
SHA1
49bee4626e538e0d7a0e034e36c04e5949ccddfd
-
SHA256
0811cf7c2702af79720305f03bb4945d63bd4052d4d6df4aa4cf8e6418e5d9de
-
SHA512
e177d2bd9fe7722a582e3c93ed9ccd25d9b0ebe0818b425d040088744aade3ae848f9ade3be28d70651af08484a9245b1db8fd2fb897f03c1d4c0332847dff0c
-
SSDEEP
3072:cmTn8N2QAzgfJkP7+TPbPT/vn/Q7rF48D2W6yop7+TPbPT/vn/Q7jF48DbF62Ime:cX7AYkkT47uC2Wno2T472CbFzXV
-
Renames multiple (6813) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
-
-
Target
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224.exe
-
Size
184KB
-
MD5
9982685953def8f730e37c9fab083076
-
SHA1
0ff503764a952733f5f2c69cc4ebc9add47eb023
-
SHA256
0dd0b31f05bd8036791494372275f393714ac18bae0f8d26a808387a0fcfe224
-
SHA512
4a1dd5124e5655c5b060df8ddbe2e00c97fa047cf05472dfa5e75c2a2c8093f734b9674a62fd81967498b7155533a4415ec37cb334163f4bfe58e75797d7325c
-
SSDEEP
3072:LA1wctAHKZRX9k8KvdoItwUeQzpnGlRuu4KXIzPCyZXK0lNOzzzzzYZt1xrWfew:M1ltAHKZRX9YmuVeopnGh4zRZ/FZRdw
Score7/10-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
-
-
Target
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0.exe
-
Size
188KB
-
MD5
fe3939ed3ab1b6c8e93187e9dedee944
-
SHA1
9d6d0fea98e4d6ba614d9c1bdc24d2e83451b228
-
SHA256
1ad888606f448d0d04c37ba11348b4c7d06f22b1cb3e8c217a21a5674bf29ce0
-
SHA512
7bd8efaa55c99728dd968c855b555a5816e17fd3c434f9dbdc3cf5458e3c273c812c4b366508e3e641ca5c1c68643fc5015d62a06b2812deb9bc21b8ce75c7f6
-
SSDEEP
3072:GqkghNWHKnYVpJBKvCzZpatl3QxP61p/JULwIjXaNKZRoW5vj/jh42qk:GqXmlpr6nnIj6KZRosLck
Score3/10 -
-
-
Target
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695.exe
-
Size
114KB
-
MD5
e534402738b11f52fd1991e2c63f816f
-
SHA1
5b166f3f830a9f6a3b2e581321c6541819c31771
-
SHA256
1c77a07e45b4f3e7f2b756c76df58a9d0f78785aa0f9e154074503398203c695
-
SHA512
b8c8c91c9846e54843098654f6ff52907c58424a8002a67cfe89af1b0905e4ac9c31afa3d407947acff14bc7aa42715f1dba2fb9f11d8e4728cf3823f831858d
-
SSDEEP
3072:Rg3cVWuLhZtblN5w1/zE5Id0bpeoXErZju:RdVWsfzO1gY0b7XErZ
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Eternity family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Disables Task Manager via registry modification
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc.exe
-
Size
169KB
-
MD5
4f3006a594b5508cd7d86a8e3823aac3
-
SHA1
516cb26210726d34709d9a6749909ad025ff6727
-
SHA256
23f1c183af6a0322746465beeb83e79c30ba8f497cd52d60e2ed544bb7b39ebc
-
SHA512
24530cdb5fb808e5ff4e2e11a32a5f9ed1706ca66884fd077da60f6b5603cc6d5d1a5c574a3a12bcb2c6e1845c3744e86740dbb6bada90d979ff2d80c530cbd5
-
SSDEEP
3072:OO8I0hNYpeUoZnXJduG1SNHGM/H4B99VH5AxuGpMS83Q9LZV:0NY4UoZnXJduG1S40kDZAxuO8K
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890.exe
-
Size
265KB
-
MD5
048df8f057b4ec78233640a09dd80e9b
-
SHA1
de16d030b3f5b067e5663eb1d75d2498c00d6817
-
SHA256
38e891599dad5b84356bad13b154ef7e26bb07aa651809a00369e52a54adc890
-
SHA512
d0cd4ce4c9d930866e269d9f44d44f79d24811d47cc700433c3611a287585b72fdc6d0ab38d07a1c3b76533d5ffd7756248d5ef68b7fe5c5218d631521d5e1b8
-
SSDEEP
3072:4OUEH7tRFNhHm/4FBVlhmhvXsk/GYtnkAtc3MmJNz7YaoXryNnv0uLT+K/5XK3mL:B7t9hpHlIt/GYiJV7Yaq2nvNLT7/I3m
-
Gozi family
-
-
-
Target
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db.exe
-
Size
184KB
-
MD5
bddda24ea5eb8c90d4515f455e15ccd2
-
SHA1
13643d56b16c171d46f3c5b23795d42714abcfb7
-
SHA256
3a13e092e9c857702ad930dbd32ff7e4819151b0eab88be26d0229d95a74b6db
-
SHA512
019d388cc938832a40b3b37bdbaeeca3dfa46916566adcd7f6aadaec053b0b9a19765b0ab64a3006a072dfe0c3892dd2efd88416c2ac576fe39bcc4fb670d701
-
SSDEEP
3072:93a8ANAzn6PkNQHxT8SZzITXXJeX6trAXy:93jYNUTHJeWAi
Score4/10 -
-
-
Target
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82.exe
-
Size
185KB
-
MD5
76ef16e94f77454aaffdfa4c700be85f
-
SHA1
9b45b3826706337a11e43248095fb2c62e42d14d
-
SHA256
3b9dabd99dc58a5242616cb6d1d876bca3046119a9b150c7d7868bf02202ea82
-
SHA512
4185cf9393877fd6d80ecfb7290c10d40a62fc7013d175e5fc91df56870500ea33b518e4f55b4e7d8a7865d3f7707fb5f49f621d5d944bb1edffda4734f99d53
-
SSDEEP
3072:fNCpBPbYsMn1mx6nWGdN6YROBxQo6PfSPgHvUJjX1qINSxT3OIpkApPxn:fNiGC6nWGdN6YO6Pf9vAjX1qINGLdRz
Score3/10 -
-
-
Target
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806.exe
-
Size
506KB
-
MD5
65cf08ffaf12e47de8cd37098aac5b33
-
SHA1
68f823b5572c628d5f8b5b0665ed7d54d85b443f
-
SHA256
58fe9776f33628fd965d1bcc442ec8dc5bfae0c648dcaec400f6090633484806
-
SHA512
81850cc1cb702ea9833b5e1afd3c90b294969ea635b3dc6513c24fb6d88b38e6b7f47d39fc217cc645f70e7528b0eb08a1f9d29089b2792a30bbdbdaa1b0369c
-
SSDEEP
12288:ArrVAOlxCOHj4yyVgxhDOpAdvaiv/+24yX5dSwlK:ArZAzRyCaDPvbv/9Xa
-
Maze family
-
Deletes shadow copies
Ransomware often targets backup files to inhibit system recovery.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Sets desktop wallpaper using registry
-
-
-
Target
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911.exe
-
Size
189KB
-
MD5
edf55c47be55365e15be64ed8240fbf0
-
SHA1
e240ec08e175e7a9739c4f3e3b9797c6f8f27d6a
-
SHA256
5ab93bd4225586706037be1870f84d4bd124b38df01f78de5648e3e0f30b8911
-
SHA512
aaa439ca2bcf0ee832f54942b37960f66262d696e4964244e5c3c47209c173de803de46e567efc9df5d2af34cafcf1049cd5a247c0049b6dfdaf5091b320247a
-
SSDEEP
1536:/y29YoWallrxCka5FMXKe0fobM/zrzhzrY:K297rVKFKKe0fobM/dg
Score3/10 -
-
-
Target
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343.exe
-
Size
156KB
-
MD5
d6d75850a2ec8570b1e0217dde3b6ac7
-
SHA1
a695229c100ede35204da2081fff6769f4d30ecb
-
SHA256
6b06c25fc6181adf110e8109550698897836b5c429fe9b013b2e51a3abc05343
-
SHA512
2d9d2b6397498e9179b514fa5796f1297f128f658dec5c9635e12c91abcbe10ecd55b31072cec9c90514a120ca41b39e540400895b4aa2ae5ba87baac00b2bc4
-
SSDEEP
1536:nhoA+BcD5sIa36HMFlS31U7lTve2Ya2ChJKzOuIzGv:CA+mD5s13/HTvZnEJ
Score10/10-
Guloader family
-
Guloader payload
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207.exe
-
Size
156KB
-
MD5
693701db23a12f69c6f8a47fde7e8ada
-
SHA1
c72997afaf96010c2ba2a53631395fc355ffc252
-
SHA256
6cc8001c9b61f55dc390743a9a6adfe2de01efd983f68599b288d39d3bfb7207
-
SHA512
09471a5757098227780f6c8a9ca61cb4cf7f33c97858855f35332699e85e8c576e63630f98927887c61554cbb2ac94f91013b2c7fb7f5eae64709393eaefa2dd
-
SSDEEP
1536:s4plMDQqy8HvtyzXJCUJ1he3mDL0ZiZpBJ1fi/dPUZJ/CeXgiD3W38QsGK7MlZcw:LpmDRXvtMJCU7DzpBhJZMIB7aOQj
Score1/10 -
-
-
Target
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f.exe
-
Size
212KB
-
MD5
43b55685945d2cecc170b850cf622038
-
SHA1
3b301a8a8a38dddd3cfb554b264342f9948102b0
-
SHA256
73ca5dd6d49b4c296ee1304aaac2e5fde01156800b538354fd27366df5b9323f
-
SHA512
ba08284c9c07150f68fc92be46cdf058caa0b6f9b25135cc2716c286efdbcfd59d79f5bf211260d900ac3fd8fe78b582010ae8985b2f240829c9b94020ae7a65
-
SSDEEP
3072:DNDzKKCY4RZzOo8u2IJskwUu25iiik4l9ep6RHpm0/d2IK9EzB2tPNxBWg3facbN:pDGKClZl8P6KVRH83TtVf33bncxfq
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0.exe
-
Size
82KB
-
MD5
71168fd55a8d0cc983b653566d942efc
-
SHA1
732906708ad72b0f41bbe8937d2b2014758dd18a
-
SHA256
7b931d48eafa703a99ca7f104daf9a7343b6f1161d49073b86f5a4700864d3f0
-
SHA512
fe374f46eb82c7bed927b48b45896ae3a0d118171e2be248905e2e14306e0c85ae4b34521b1c0af90cb2bb6f7fe45800d289ce36b4921067aeea3e9c2a9a0842
-
SSDEEP
768:569iQap3x5Mt/+E6kmzVmh8uVHI5432rufLRoYFIk1eUwHXPmI+mL:o9m5Mt/+EtmzVs8ui+3IyRbykUHfFh
Score10/10-
CrimsonRAT main payload
-
Crimsonrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f.exe
-
Size
247KB
-
MD5
312e0a90fe8474691950d41e57bfb003
-
SHA1
f8185c7943c6e93b75c0cec34daf2eccd7db848b
-
SHA256
7d6892645bc5ba581b2fff986b3e9371dd7298bab6aac890c99f80c8b1d78f0f
-
SHA512
511b9029002da76cceaa9fc2a47aebfe6a365f3588614094ec8bddaaad80305fe79ba45d9a1cb23ca0c1d1572eb5106073fac033b644df5e867a13db69e39678
-
SSDEEP
3072:FYl5q4euWjwNpbF3onQ7twT12Hd+d9nVap5Ty6dz6m:yTqgWcbF/7twTWm64
Score10/10-
BlackNET payload
-
Blacknet family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e.exe
-
Size
87KB
-
MD5
cd9dca1277ac7597aaff4d93c866692b
-
SHA1
2446eb432aee7ea6a387db50623bfa1c7dd9d515
-
SHA256
9036aeb570b22497c0f937e7edcef624800426011f0193a2b78c7f124e3a4c7e
-
SHA512
0e826ee27ffb6299071db1c363e48e81b9e5f8278d648048e95ee437ba23d127d63ec0cc67aeb25c74929c51d79ca24ab14d27756a76fd988758bf29f32ba9c7
-
SSDEEP
1536:IooxEzyAtoLcNDsWjcdYj5x0Et+supkyxFCELwDXFai2Q:I34FtJsc5N+sarLcf2Q
Score3/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
2File Deletion
2Modify Registry
3Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
3Credentials In Files
3