General
-
Target
vzlom moscow.exe
-
Size
7.5MB
-
Sample
241224-s4jd6a1lem
-
MD5
9410e07e7ce3594da61b33610c5aa82d
-
SHA1
ef8802b2a2fffade19ec0dfb17756e920680d556
-
SHA256
f18b9f7365a004c14b829c4148d509805acd9fe44cf6613558afbd8d1bf1ab31
-
SHA512
8d4e34fba47bf9cde627c84b7673d0aeb0733da319995463c68965a600f774a8db067209746792cc45c2d79fab5a7de42c9bf2dc96ff5ebe9ffb3d246d9628ab
-
SSDEEP
196608:HAgVVE/fwfI9jUC2gYBYv3vbW2+iITx1U6nA:ZVVEMIH2gYBgDWJTnzA
Behavioral task
behavioral1
Sample
vzlom moscow.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
vzlom moscow.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
��{��.pyc
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral4
Sample
��{��.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
vzlom moscow.exe
-
Size
7.5MB
-
MD5
9410e07e7ce3594da61b33610c5aa82d
-
SHA1
ef8802b2a2fffade19ec0dfb17756e920680d556
-
SHA256
f18b9f7365a004c14b829c4148d509805acd9fe44cf6613558afbd8d1bf1ab31
-
SHA512
8d4e34fba47bf9cde627c84b7673d0aeb0733da319995463c68965a600f774a8db067209746792cc45c2d79fab5a7de42c9bf2dc96ff5ebe9ffb3d246d9628ab
-
SSDEEP
196608:HAgVVE/fwfI9jUC2gYBYv3vbW2+iITx1U6nA:ZVVEMIH2gYBgDWJTnzA
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
��{��.pyc
-
Size
1KB
-
MD5
e402dec3c67682304ad43ed19cf4afa2
-
SHA1
41bddc7c81ea799a377d2010eb55ac4bd17d7308
-
SHA256
97e623557736c064a37cd52a220003bd4fdcd15c74ba06f548f0b65be52dcfb6
-
SHA512
bde66c8fe50b0682f067491bf0fb518de661ff62098ac0ce053d2689e0512e80cbb5f30b03d2bd239edf68429a2784dc524ca3927999ea661394c3816229d2c1
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1