Resubmissions

17-01-2025 13:15

250117-qhg8vsypcz 4

17-01-2025 11:29

250117-nlw53swmar 4

09-01-2025 21:28

250109-1bc1ns1qgt 4

05-01-2025 19:25

250105-x44gjstlew 10

Analysis

  • max time kernel
    122s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-01-2025 19:25

General

  • Target

    TeraBoxHost.exe

  • Size

    643KB

  • MD5

    33bdad0009ea101f8ff1c4a33cfc5f8b

  • SHA1

    7f42bc455635562b3a5559721aacd8edc8ab4dd4

  • SHA256

    d238e129d8c4d15c48d56445ee1f07a816b140bae2e76d5e251c7c0c265896f9

  • SHA512

    d911807851b4ed78fcb82a1fd37159910657b5d51d84fb4e8ee15f174fb6fb8483c95b5941334976830c38cdf407726cef4b9a58581c9f01451e27042b16e02d

  • SSDEEP

    6144:V+nj7IXYnzhmoX5Rz0jdWNuyxmnbjxzqHRz3sUntv0s:zLoX4XNknT

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe
    "C:\Users\Admin\AppData\Local\Temp\TeraBoxHost.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads