Overview
overview
10Static
static
10Makala Executor.zip
windows7-x64
1Makala Executor.zip
windows10-2004-x64
1Makala Exe...ox.dll
windows7-x64
1Makala Exe...ox.dll
windows10-2004-x64
1Makala Exe...I2.dll
windows7-x64
1Makala Exe...I2.dll
windows10-2004-x64
1Makala Exe...er.exe
windows7-x64
10Makala Exe...er.exe
windows10-2004-x64
10Makala Exe...config
windows7-x64
3Makala Exe...config
windows10-2004-x64
3Makala Exe...la.pdb
windows7-x64
3Makala Exe...la.pdb
windows10-2004-x64
3Makala Exe...UI.dll
windows7-x64
1Makala Exe...UI.dll
windows10-2004-x64
1Makala Exe...no.dll
windows7-x64
1Makala Exe...no.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...sh.dll
windows7-x64
1Makala Exe...sh.dll
windows10-2004-x64
1Makala Exe...td.dll
windows7-x64
1Makala Exe...td.dll
windows10-2004-x64
1Makala Exe...er.txt
windows7-x64
1Makala Exe...er.txt
windows10-2004-x64
1Makala Exe...is.dll
windows7-x64
1Makala Exe...is.dll
windows10-2004-x64
1Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 23:48
Behavioral task
behavioral1
Sample
Makala Executor.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Makala Executor.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Makala Executor/Guna.UI2.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Makala Executor/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Makala Executor/Makala.config
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
Makala Executor/Makala.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Makala Executor/Makala.pdb
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Makala Executor/Makala.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Makala Executor/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Makala Executor/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Makala Executor/bin/Xeno.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
Makala Executor/bin/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Makala Executor/bin/xxhash.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Makala Executor/bin/xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Makala Executor/bin/zstd.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Makala Executor/bin/zstd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Makala Executor/cver.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Makala Executor/cver.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Makala Executor/cxapis.dll
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Makala Executor/cxapis.dll
Resource
win10v2004-20241007-en
General
-
Target
Makala Executor/bin/xxhash.dll
-
Size
46KB
-
MD5
70c514826d9428f184d27f0c8f397404
-
SHA1
e6b0b1a396de9913004d9bcaa230972686416bb6
-
SHA256
aff59e91d222b75b3e3ac789baba9e24eff99796261ae5e887ef9e3c28bb3d64
-
SHA512
168c63cbb54865ca42a884fd974291bcadd9dd8cf8bc1980148214e84498af42a590cb3d3a394765ee0b7d2e337fab6e85ff4f85d9ced97b92b540152202a0a6
-
SSDEEP
768:tziPp7yW4k3QDn24NuDUSu0MKQVMNKuxYAuogba4Mk3Q18swN1WQ8hi6U:tziR74kgDn2rDRuIrN5mAvgbTg18DN1z
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1600 wrote to memory of 2664 1600 rundll32.exe 30 PID 1600 wrote to memory of 2664 1600 rundll32.exe 30 PID 1600 wrote to memory of 2664 1600 rundll32.exe 30