Overview
overview
8Static
static
3Documents.zip
windows7-x64
Documents.zip
windows10-2004-x64
Documents.zip
android-9-x86
Documents.zip
android-10-x64
Documents.zip
android-11-x64
Documents.zip
macos-10.15-amd64
Documents.zip
ubuntu-18.04-amd64
Documents.zip
debian-9-armhf
Documents.zip
debian-9-mips
Documents.zip
debian-9-mipsel
Ionic.Zip.Reduced.dll
windows7-x64
Ionic.Zip.Reduced.dll
windows10-2004-x64
Ionic.Zip.Reduced.dll
android-9-x86
Ionic.Zip.Reduced.dll
android-10-x64
Ionic.Zip.Reduced.dll
android-11-x64
Ionic.Zip.Reduced.dll
macos-10.15-amd64
Ionic.Zip.Reduced.dll
ubuntu-18.04-amd64
Ionic.Zip.Reduced.dll
debian-9-armhf
Ionic.Zip.Reduced.dll
debian-9-mips
Ionic.Zip.Reduced.dll
debian-9-mipsel
[Leakcloud...er.exe
windows7-x64
8[Leakcloud...er.exe
windows10-2004-x64
8[Leakcloud...er.exe
android-9-x86
[Leakcloud...er.exe
android-10-x64
[Leakcloud...er.exe
android-11-x64
[Leakcloud...er.exe
macos-10.15-amd64
[Leakcloud...er.exe
ubuntu-18.04-amd64
[Leakcloud...er.exe
debian-9-armhf
[Leakcloud...er.exe
debian-9-mips
[Leakcloud...er.exe
debian-9-mipsel
Analysis
-
max time kernel
892s -
max time network
847s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
13-01-2025 00:12
Static task
static1
Behavioral task
behavioral1
Sample
Documents.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Documents.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Documents.zip
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
Documents.zip
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
Documents.zip
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
Documents.zip
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
Documents.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
Documents.zip
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
Documents.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
Documents.zip
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
Ionic.Zip.Reduced.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ionic.Zip.Reduced.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ionic.Zip.Reduced.dll
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
Ionic.Zip.Reduced.dll
Resource
android-x64-20240624-en
Behavioral task
behavioral15
Sample
Ionic.Zip.Reduced.dll
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral16
Sample
Ionic.Zip.Reduced.dll
Resource
macos-20241101-en
Behavioral task
behavioral17
Sample
Ionic.Zip.Reduced.dll
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral19
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral21
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral24
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral25
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral26
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
macos-20241106-en
Behavioral task
behavioral27
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral29
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral30
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
[Leakcloud.fun] Link Skipper.exe
-
Size
523.0MB
-
MD5
b928c8e9fbdea0d3d904df7a09955640
-
SHA1
3caec7a61590a0287d2c350da8439cf977f3ab7a
-
SHA256
1f1407140a7a550335d170429646438cef0d37ec51a6378ac08c132e9e7d8420
-
SHA512
7627815855b32eec15e358246f2764b517790afb7bdac6ada17ec3184c96397248f1ce1150d3efe54f779f0e290bb2d03b6124a6c6df2dd2c7cfadc0138a627a
-
SSDEEP
49152:XJED040Mm05vldXLyY4huQNuZo+rGlYnqRK7xPNH6Yjs1hm0zydRtmSH07JS44iE:XCX5soNvqRK7dqSdzmy4JMdaP67
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2900 powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe 772 [Leakcloud.fun] Link Skipper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 772 [Leakcloud.fun] Link Skipper.exe 2900 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 powershell.exe Token: SeDebugPrivilege 772 [Leakcloud.fun] Link Skipper.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 772 wrote to memory of 2320 772 [Leakcloud.fun] Link Skipper.exe 31 PID 772 wrote to memory of 2320 772 [Leakcloud.fun] Link Skipper.exe 31 PID 772 wrote to memory of 2320 772 [Leakcloud.fun] Link Skipper.exe 31 PID 2320 wrote to memory of 2900 2320 cmd.exe 33 PID 2320 wrote to memory of 2900 2320 cmd.exe 33 PID 2320 wrote to memory of 2900 2320 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe"C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe" cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-