General
-
Target
1136f4b6ae586049ce814f089fe9e6f2347f041606a4dc763f3c3056fb692ed1.zip
-
Size
27.0MB
-
Sample
241218-cpjtdaykcw
-
MD5
2e098fb855af6870024d1d87e01736dd
-
SHA1
62be3c6384a5653033e505d0e5e4db3047371ea0
-
SHA256
1136f4b6ae586049ce814f089fe9e6f2347f041606a4dc763f3c3056fb692ed1
-
SHA512
e546d78b1f54757784657ef62e77a508f1f08caa4ebe85f11547b015dcd7d4ecfd49a03523ca2299e64b6415b4b26627237d9092e8ba19e43bddbbee1a6ecf16
-
SSDEEP
786432:PVliLeGczvUKs0Oie4fYHSBTWEw4nE8EEqhE:HVG5D064PTWAfwE
Behavioral task
behavioral1
Sample
mains-main/Java.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mains-main/Java.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mains-main/Java.jar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mains-main/Java.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
mains-main/Javadsadsa.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
mains-main/Javadsadsa.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
mains-main/Java.exe
-
Size
7.7MB
-
MD5
e986bc7d990ae823663fed0431fbf9d4
-
SHA1
cf38be98339624451546b6a1f64c8aaa92b6ba0b
-
SHA256
535058a630b1d9fb40eedf40c77497652e32a0fabcdb077022118e3d159c1ff8
-
SHA512
02019f314a411f64fb704c7edf0fecc23487cc2a5aae92b392ac1b40036a247d3cd2252ef55b1bbd65ba7a6585aacad004583f156cd96c9fa68f36c2aa36a95d
-
SSDEEP
196608:VE0SieNTfm/pf+xk4dNSESRGtrbWOjgWyS:My/pWu4m5RGtrbvMWyS
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
mains-main/Java.jar
-
Size
20.1MB
-
MD5
35104d7c2b898e95d2376dae16480947
-
SHA1
63e5393576254cf8f0a2bc98c685a42725ae5816
-
SHA256
214e9a22cfc442496b56584cc6fc8127a36b647652d532c67c091c1bd546a3a7
-
SHA512
778222e37dd395850a65d30ffd4e9818b6fd9b381d3dbae0e66585ad2f2785e908938dfadbc3c4ef83652c59d407697a27c9a33fb973ef0e8435aa07c31e1b98
-
SSDEEP
393216:2ypV3BNHWn22TgCWb+S0wjCeZqz7tCJXh9Qmw73gCcwzadJovsXWeGN+DA:2eFQ2rGSfCtCJXTqzgCcwz2oEXU
Score1/10 -
-
-
Target
mains-main/Javadsadsa.exe
-
Size
2B
-
MD5
81051bcc2cf1bedf378224b0a93e2877
-
SHA1
ba8ab5a0280b953aa97435ff8946cbcbb2755a27
-
SHA256
7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
-
SHA512
1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
Score1/10 -