General
-
Target
family_ddos_panel.rar
-
Size
7.4MB
-
Sample
241201-erwxtswpds
-
MD5
812234e60fa806843ed86326d9ae5eef
-
SHA1
dade52017279da6f8c5d8a89370d0cdbfdd91c9e
-
SHA256
2bfbf65499c70040bec3ca02c44dfd3a6a589875224881bf5e5707e46a126799
-
SHA512
a709cdbd6fd3067c028d2381e79ad033eadf82176e96645f51f057649f0c92d787ef105670f77706a8ac71bff24cd1cc593551a91ee749e660117de2554d1f3d
-
SSDEEP
196608:uDHHqnKm5gJz8DQdo/utYP+Ld3YkVkjbNoFKo/xvb:ubqN5gJzyWSPI3YpNo0yvb
Behavioral task
behavioral1
Sample
pizzasrolle_ddostool.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
pizzasrolle_ddostool.exe
-
Size
7.6MB
-
MD5
776a2bbeea896973605cdd415293b52a
-
SHA1
29c2f38150329dfa79b634be4f4ff60e1de501d4
-
SHA256
2a2246e0933c66735c0c88541f20a738649b0caf18d8327c422b53f4019659b3
-
SHA512
e9a8f478943d322a5b52e797c6e7ae701e8e8606cbbbf63b1a59c7e509303c7b3f7254fcefbf3db29d85888d71e4508041b0b7ebd654d0a3fe3ee6fe5c840ae1
-
SSDEEP
196608:72HY/yCwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:ZyBIHziK1piXLGVE4Ue0VJI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3