Resubmissions
12-12-2024 19:55
241212-ym8klsxnfp 1012-12-2024 19:20
241212-x12tjsvkgv 1012-12-2024 19:16
241212-xy8jbavkaz 1012-12-2024 19:16
241212-xy39lavkat 1012-12-2024 18:49
241212-xgrjgavqap 1012-12-2024 18:46
241212-xe5nbatjet 1012-12-2024 18:39
241212-xa1tkavncm 1012-12-2024 18:27
241212-w3sg8aspa1 10General
-
Target
mta.exe
-
Size
98KB
-
Sample
241212-xy8jbavkaz
-
MD5
778dce14368e8b1105544c43ce09d2f1
-
SHA1
81c7cc17d48b8c5e6e5b9cc1efc8bbae1646dcb0
-
SHA256
1d184c635a032625f10639ec3458a6f8d0a36a6a82078a11b820924f39056080
-
SHA512
31a517a024726bef90c60c05173852de117e27960e981ec92456e6a3e4c0b6ac50437b8bfd2ced7afbad2a81c3e00a4c9bd5622af2236f3ae37856d6fd9d4aab
-
SSDEEP
1536:Vic45PApy/vpjAnT9ZqzY4r5VVZDAcE3VCQfwbJ6Pr5+NzxCxoKV6+UyNV:AxApgR8T9EE4r5n8rwbJ6Pr5+zNyj
Behavioral task
behavioral1
Sample
mta.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
mta.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
mta.exe
-
Size
98KB
-
MD5
778dce14368e8b1105544c43ce09d2f1
-
SHA1
81c7cc17d48b8c5e6e5b9cc1efc8bbae1646dcb0
-
SHA256
1d184c635a032625f10639ec3458a6f8d0a36a6a82078a11b820924f39056080
-
SHA512
31a517a024726bef90c60c05173852de117e27960e981ec92456e6a3e4c0b6ac50437b8bfd2ced7afbad2a81c3e00a4c9bd5622af2236f3ae37856d6fd9d4aab
-
SSDEEP
1536:Vic45PApy/vpjAnT9ZqzY4r5VVZDAcE3VCQfwbJ6Pr5+NzxCxoKV6+UyNV:AxApgR8T9EE4r5n8rwbJ6Pr5+zNyj
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Discordrat family
-
A potential corporate email address has been identified in the URL: [email protected]
-
Legitimate hosting services abused for malware hosting/C2
-
Sets desktop wallpaper using registry
-