Overview
overview
10Static
static
10multitool/...OS.exe
windows10-2004-x64
3multitool/...ts.exe
windows10-2004-x64
1multitool/...d).exe
windows10-2004-x64
3multitool/...at.exe
windows10-2004-x64
10multitool/...UI.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
3multitool/...ib.dll
windows10-2004-x64
1multitool/...er.exe
windows10-2004-x64
6multitool/main.bat
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:48
Behavioral task
behavioral1
Sample
multitool/files/DDOS.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
multitool/files/FastVisits.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
multitool/files/LeanWoofer (Unpacked).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
multitool/files/Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
multitool/files/Siticone.UI.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
multitool/files/builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
multitool/files/dnlib.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
multitool/files/woofer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
multitool/main.bat
Resource
win10v2004-20241007-en
General
-
Target
multitool/main.bat
-
Size
2KB
-
MD5
6357b19e4a479b48d66104227cf5a32f
-
SHA1
61a1be7dd806c2cb5bfd8def4dee316c28ff6637
-
SHA256
98b4f8e7c918137dc1e5fb0e67926d8d1e657b7d0f22437f3a8829ee0ba26bff
-
SHA512
a0eff81a0598b343e6547430a1534df7c13e9d70ce78faf8f0480d5f3f327b8ff28d95b2cba9ca21813e87479357adaaeb61973c8ac3b1b5bf2868eb0087116c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1728 builder.exe 1728 builder.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1728 builder.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4680 wrote to memory of 2956 4680 cmd.exe 82 PID 4680 wrote to memory of 2956 4680 cmd.exe 82 PID 4680 wrote to memory of 1728 4680 cmd.exe 84 PID 4680 wrote to memory of 1728 4680 cmd.exe 84 PID 4680 wrote to memory of 1728 4680 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\multitool\main.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\system32\chcp.comchcp 650012⤵PID:2956
-
-
C:\Users\Admin\AppData\Local\Temp\multitool\files\builder.exebuilder.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1728
-