Overview
overview
10Static
static
3-°¦n+¦++.exe
windows7-x64
1PC远控测试-.exe
windows7-x64
3vip文件�...��.exe
windows7-x64
10菲律宾�...P4.exe
windows7-x64
6远程控�...2).exe
windows7-x64
3远程控�...2).exe
windows7-x64
3远程控�...�-.exe
windows7-x64
3远程控�...�-.exe
windows7-x64
3钱包收�...2).exe
windows7-x64
3钱包收�...�-.exe
windows7-x64
3Analysis
-
max time kernel
15s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 21:25
Behavioral task
behavioral1
Sample
-°¦n+¦++.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
PC远控测试-.exe
Resource
win7-20240708-en
Behavioral task
behavioral3
Sample
vip文件捆绑器.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
菲律宾王小柔疫情期间宾馆做爱视频流出.MP4.exe
Resource
win7-20241010-en
Behavioral task
behavioral5
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
远程控制 测试- (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
远程控制 测试-.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
远程控制 测试-.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
钱包收款地址强制更改器- (2).exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
钱包收款地址强制更改器-.exe
Resource
win7-20240729-en
General
-
Target
远程控制 测试-.exe
-
Size
1.9MB
-
MD5
1abafb07254557a7e1c4045d16765c4d
-
SHA1
024ff7967ccc6e1237e74d23f2fab9840994a03b
-
SHA256
b784b6c6eb56fb91cb881a18e5e5ce630c96b5e49b131363c4776a097bb4bdea
-
SHA512
f24eabcdcfc932a9fb15042e200f8b2caf41cb2d7e718977fbaf16a14d8e1bbcf29cf7d7bdca715e0e26a88f7162b2ae8a4c2968f8036d940fd0e96d1ccf959f
-
SSDEEP
49152:lzvq2Kp7NXRRBChNoRhUfERKbVNK7hiwUOdj4rhEOX66VEl56r:o2Kp7NXlChNoRhRAbVNK7hiw14rKm669
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 远程控制 测试-.exe