Analysis

  • max time kernel
    93s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 10:01

General

  • Target

    0112f89f5ee209d25a565b600bb2189593927ed1f5db0fcadd184f5b396f0a30.exe

  • Size

    634KB

  • MD5

    b075d91a77d738ff75d9103499fd6307

  • SHA1

    fe367a9ab479b2b5748fa1269cce6b45bebe32d8

  • SHA256

    0112f89f5ee209d25a565b600bb2189593927ed1f5db0fcadd184f5b396f0a30

  • SHA512

    93c48cc365229e7dd5ee5863cb249875ff87c115202689d3f9edad935f3aab61c5474de8efde6ea46200325c364e896b61910b8251a8610de94e5a463e74fd9f

  • SSDEEP

    12288:DTs9wyMzoSkrf+Djy1ZRD2wDp/XAtc9BAErNZsQRJ+W2/8tm:G4Vkrf+Djy1ZRCEIETzRJ+W2/j

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0112f89f5ee209d25a565b600bb2189593927ed1f5db0fcadd184f5b396f0a30.exe
    "C:\Users\Admin\AppData\Local\Temp\0112f89f5ee209d25a565b600bb2189593927ed1f5db0fcadd184f5b396f0a30.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3188-0-0x0000000001000000-0x000000000125F000-memory.dmp

    Filesize

    2.4MB

  • memory/3188-1-0x0000000001007000-0x0000000001008000-memory.dmp

    Filesize

    4KB

  • memory/3188-2-0x0000000001000000-0x000000000125F000-memory.dmp

    Filesize

    2.4MB