General
-
Target
pizzasrolle_ddostool.exe
-
Size
7.6MB
-
Sample
241201-hbvllssqbm
-
MD5
776a2bbeea896973605cdd415293b52a
-
SHA1
29c2f38150329dfa79b634be4f4ff60e1de501d4
-
SHA256
2a2246e0933c66735c0c88541f20a738649b0caf18d8327c422b53f4019659b3
-
SHA512
e9a8f478943d322a5b52e797c6e7ae701e8e8606cbbbf63b1a59c7e509303c7b3f7254fcefbf3db29d85888d71e4508041b0b7ebd654d0a3fe3ee6fe5c840ae1
-
SSDEEP
196608:72HY/yCwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:ZyBIHziK1piXLGVE4Ue0VJI
Behavioral task
behavioral1
Sample
pizzasrolle_ddostool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
pizzasrolle_ddostool.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�[.S���.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
�[.S���.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
pizzasrolle_ddostool.exe
-
Size
7.6MB
-
MD5
776a2bbeea896973605cdd415293b52a
-
SHA1
29c2f38150329dfa79b634be4f4ff60e1de501d4
-
SHA256
2a2246e0933c66735c0c88541f20a738649b0caf18d8327c422b53f4019659b3
-
SHA512
e9a8f478943d322a5b52e797c6e7ae701e8e8606cbbbf63b1a59c7e509303c7b3f7254fcefbf3db29d85888d71e4508041b0b7ebd654d0a3fe3ee6fe5c840ae1
-
SSDEEP
196608:72HY/yCwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j8:ZyBIHziK1piXLGVE4Ue0VJI
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
�[.S���.pyc
-
Size
1KB
-
MD5
dc47fe3d504ca157c57f9a1640c032e6
-
SHA1
d49270a3199e078fb344d28c45b41a51b3dd9fe6
-
SHA256
d648fab4669cd5deb38c2132b26b16185cce690186ff66aa82db31c0d192cd01
-
SHA512
c86951c0a46be0410cdac623ad3dbac9a6bd645d9ab1afc8b05eb2f157b33c252a77b8f920b69ad2a49419806cd45260e68572801eb1bba18ccfef1935a152ac
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3