General
-
Target
Sryxen-main.zip
-
Size
1.1MB
-
Sample
241204-wdn4haypbr
-
MD5
235c8379ad047cc7f1dae05470e235a8
-
SHA1
c9a328a779395449bb6a58c01322892b63d506c3
-
SHA256
4005a08a4853f72ebd58f49ea28e39b0ecf239eb9ada1aaa2c3adcfec8a48238
-
SHA512
23e5dd80f76812502f91d57ab1f303da41d43367d5e05777e43e6692fd3ffde3668f740347baceb4976a440ab659c518d5bc9694e5efd77ba1fee4b666d97849
-
SSDEEP
24576:IjvbwBoSoz39x2UTLmpLtWv6SKZQrE/j1aMoLs:I/wBEzNo+LmttWvtQBYs
Static task
static1
Behavioral task
behavioral1
Sample
Sryxen-main.zip
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
Sryxen-main.zip
-
Size
1.1MB
-
MD5
235c8379ad047cc7f1dae05470e235a8
-
SHA1
c9a328a779395449bb6a58c01322892b63d506c3
-
SHA256
4005a08a4853f72ebd58f49ea28e39b0ecf239eb9ada1aaa2c3adcfec8a48238
-
SHA512
23e5dd80f76812502f91d57ab1f303da41d43367d5e05777e43e6692fd3ffde3668f740347baceb4976a440ab659c518d5bc9694e5efd77ba1fee4b666d97849
-
SSDEEP
24576:IjvbwBoSoz39x2UTLmpLtWv6SKZQrE/j1aMoLs:I/wBEzNo+LmttWvtQBYs
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops desktop.ini file(s)
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Discovery
Browser Information Discovery
1Peripheral Device Discovery
2Query Registry
3System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1System Time Discovery
1