Overview
overview
10Static
static
10Makala Executor.zip
windows7-x64
1Makala Executor.zip
windows10-2004-x64
1Makala Exe...ox.dll
windows7-x64
1Makala Exe...ox.dll
windows10-2004-x64
1Makala Exe...I2.dll
windows7-x64
1Makala Exe...I2.dll
windows10-2004-x64
1Makala Exe...er.exe
windows7-x64
10Makala Exe...er.exe
windows10-2004-x64
10Makala Exe...config
windows7-x64
3Makala Exe...config
windows10-2004-x64
3Makala Exe...la.pdb
windows7-x64
3Makala Exe...la.pdb
windows10-2004-x64
3Makala Exe...UI.dll
windows7-x64
1Makala Exe...UI.dll
windows10-2004-x64
1Makala Exe...no.dll
windows7-x64
1Makala Exe...no.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...64.dll
windows7-x64
1Makala Exe...64.dll
windows10-2004-x64
1Makala Exe...sh.dll
windows7-x64
1Makala Exe...sh.dll
windows10-2004-x64
1Makala Exe...td.dll
windows7-x64
1Makala Exe...td.dll
windows10-2004-x64
1Makala Exe...er.txt
windows7-x64
1Makala Exe...er.txt
windows10-2004-x64
1Makala Exe...is.dll
windows7-x64
1Makala Exe...is.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 23:50
Behavioral task
behavioral1
Sample
Makala Executor.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Makala Executor.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
Makala Executor/FastColoredTextBox.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Makala Executor/Guna.UI2.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
Makala Executor/Guna.UI2.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Makala Executor/Makala Bootstrapper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Makala Executor/Makala.config
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
Makala Executor/Makala.config
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Makala Executor/Makala.pdb
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Makala Executor/Makala.pdb
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Makala Executor/Siticone.UI.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Makala Executor/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Makala Executor/bin/Xeno.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Makala Executor/bin/Xeno.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Makala Executor/bin/libcrypto-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Makala Executor/bin/libssl-3-x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Makala Executor/bin/xxhash.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
Makala Executor/bin/xxhash.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Makala Executor/bin/zstd.dll
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
Makala Executor/bin/zstd.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Makala Executor/cver.txt
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
Makala Executor/cver.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Makala Executor/cxapis.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Makala Executor/cxapis.dll
Resource
win10v2004-20241007-en
General
-
Target
Makala Executor/Makala.pdb
-
Size
49KB
-
MD5
5ecbd7ca622c4e0f344e754cfabd6fef
-
SHA1
e97af1ad1ea3d36293cb3d178ddb63e8dd730af5
-
SHA256
257b45becadd3bb8e33fe89f6a14b65d079e00ac4aa564436f15f8efcf9e8204
-
SHA512
fedd453b3bf64a293fcc8c189a823d567bd998622d99f31cf94b19e55fc2b5f14210cdbcb97fc5f57d1f2d5be870599cedb7e513d52c1efcc81eef167edd86e8
-
SSDEEP
768:tSJCJF8z+s28VenBT5oDYlHla8z+s2j9DY:0Ve9CCHG9
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 OpenWith.exe