Overview
overview
10Static
static
10multitool/...OS.exe
windows10-2004-x64
3multitool/...ts.exe
windows10-2004-x64
1multitool/...d).exe
windows10-2004-x64
3multitool/...at.exe
windows10-2004-x64
10multitool/...UI.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
3multitool/...ib.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
6multitool/main.bat
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:48
Behavioral task
behavioral1
Sample
multitool/files/DDOS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
multitool/files/FastVisits.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
multitool/files/LeanWoofer (Unpacked).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
multitool/files/Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
multitool/files/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
multitool/files/builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
multitool/files/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
multitool/files/woofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
multitool/main.bat
Resource
win10v2004-20241007-en
General
-
Target
multitool/files/woofer.exe
-
Size
13.4MB
-
MD5
0933793f1e2b5a9a80275cfd2d7da1e5
-
SHA1
7e31aafd8f963dc413fe44a65b620e6dd3a6b3b8
-
SHA256
60677c248da104d4fcdf855bb80756e16224e85a782d16249a0d0d7393d3149a
-
SHA512
2d00aec6ff175c06835daf3c3518a1b78c56ccfb533e6b49a42aaf01b5128b325a721a16c209d314956c60aec8972373e00a1d0a63649a38dcd40d304866e497
-
SSDEEP
393216:FoFdTHWZRIQQXyYXhxiFCxWKxxnp+2GmGQ7kroV:FoFhARIzXhaCxWKxxnpnGagO
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 12 pastebin.com 13 pastebin.com -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Win64 woofer.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language woofer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe 4076 woofer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4076 woofer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe"C:\Users\Admin\AppData\Local\Temp\multitool\files\woofer.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076