Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2024 02:24

General

  • Target

    49e30ee8a68a57921a60452248250190759c7cc95fbd1f69be3300f2da410ec0.exe

  • Size

    594KB

  • MD5

    ead6d9468e89f1a8dfd7674603f807ef

  • SHA1

    054f65045da981e5ff7611ca101125c6af9cf492

  • SHA256

    49e30ee8a68a57921a60452248250190759c7cc95fbd1f69be3300f2da410ec0

  • SHA512

    c603307b12c6fc92750d54244a61eb2480a63dbb534e98429bdd76cd0487887c0f35e7c370801c56b6f54e59f87310a2d31ddf9059187f62ca813fea0ab5f595

  • SSDEEP

    12288:UMU7R8B7rSMrgO10sCRgNU3CFbcz8uNJ/gst4fy+/Hqd6/rYN+ld:UJ7R8B7rSMrX10sKgNSCFbc4uNd14vHV

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\49e30ee8a68a57921a60452248250190759c7cc95fbd1f69be3300f2da410ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\49e30ee8a68a57921a60452248250190759c7cc95fbd1f69be3300f2da410ec0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2768-0-0x0000000001000000-0x00000000011B0000-memory.dmp

    Filesize

    1.7MB

  • memory/2768-1-0x0000000001003000-0x0000000001005000-memory.dmp

    Filesize

    8KB

  • memory/2768-2-0x0000000001000000-0x00000000011B0000-memory.dmp

    Filesize

    1.7MB