Overview
overview
8Static
static
3Documents.zip
windows7-x64
Documents.zip
windows10-2004-x64
Documents.zip
android-9-x86
Documents.zip
android-10-x64
Documents.zip
android-11-x64
Documents.zip
macos-10.15-amd64
Documents.zip
ubuntu-18.04-amd64
Documents.zip
debian-9-armhf
Documents.zip
debian-9-mips
Documents.zip
debian-9-mipsel
Ionic.Zip.Reduced.dll
windows7-x64
Ionic.Zip.Reduced.dll
windows10-2004-x64
Ionic.Zip.Reduced.dll
android-9-x86
Ionic.Zip.Reduced.dll
android-10-x64
Ionic.Zip.Reduced.dll
android-11-x64
Ionic.Zip.Reduced.dll
macos-10.15-amd64
Ionic.Zip.Reduced.dll
ubuntu-18.04-amd64
Ionic.Zip.Reduced.dll
debian-9-armhf
Ionic.Zip.Reduced.dll
debian-9-mips
Ionic.Zip.Reduced.dll
debian-9-mipsel
[Leakcloud...er.exe
windows7-x64
8[Leakcloud...er.exe
windows10-2004-x64
8[Leakcloud...er.exe
android-9-x86
[Leakcloud...er.exe
android-10-x64
[Leakcloud...er.exe
android-11-x64
[Leakcloud...er.exe
macos-10.15-amd64
[Leakcloud...er.exe
ubuntu-18.04-amd64
[Leakcloud...er.exe
debian-9-armhf
[Leakcloud...er.exe
debian-9-mips
[Leakcloud...er.exe
debian-9-mipsel
Analysis
-
max time kernel
901s -
max time network
441s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 00:12
Static task
static1
Behavioral task
behavioral1
Sample
Documents.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Documents.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Documents.zip
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
Documents.zip
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
Documents.zip
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
Documents.zip
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
Documents.zip
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
Documents.zip
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral9
Sample
Documents.zip
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
Documents.zip
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral11
Sample
Ionic.Zip.Reduced.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Ionic.Zip.Reduced.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Ionic.Zip.Reduced.dll
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral14
Sample
Ionic.Zip.Reduced.dll
Resource
android-x64-20240624-en
Behavioral task
behavioral15
Sample
Ionic.Zip.Reduced.dll
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral16
Sample
Ionic.Zip.Reduced.dll
Resource
macos-20241101-en
Behavioral task
behavioral17
Sample
Ionic.Zip.Reduced.dll
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral19
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
Ionic.Zip.Reduced.dll
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral21
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral24
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral25
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral26
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
macos-20241106-en
Behavioral task
behavioral27
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral28
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral29
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral30
Sample
[Leakcloud.fun] Link Skipper.exe
Resource
debian9-mipsel-20240226-en
General
-
Target
[Leakcloud.fun] Link Skipper.exe
-
Size
523.0MB
-
MD5
b928c8e9fbdea0d3d904df7a09955640
-
SHA1
3caec7a61590a0287d2c350da8439cf977f3ab7a
-
SHA256
1f1407140a7a550335d170429646438cef0d37ec51a6378ac08c132e9e7d8420
-
SHA512
7627815855b32eec15e358246f2764b517790afb7bdac6ada17ec3184c96397248f1ce1150d3efe54f779f0e290bb2d03b6124a6c6df2dd2c7cfadc0138a627a
-
SSDEEP
49152:XJED040Mm05vldXLyY4huQNuZo+rGlYnqRK7xPNH6Yjs1hm0zydRtmSH07JS44iE:XCX5soNvqRK7dqSdzmy4JMdaP67
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4756 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation [Leakcloud.fun] Link Skipper.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3800 [Leakcloud.fun] Link Skipper.exe 3800 [Leakcloud.fun] Link Skipper.exe 4756 powershell.exe 4756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4756 powershell.exe Token: SeDebugPrivilege 3800 [Leakcloud.fun] Link Skipper.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3800 wrote to memory of 3300 3800 [Leakcloud.fun] Link Skipper.exe 82 PID 3800 wrote to memory of 3300 3800 [Leakcloud.fun] Link Skipper.exe 82 PID 3300 wrote to memory of 4756 3300 cmd.exe 84 PID 3300 wrote to memory of 4756 3300 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe"C:\Users\Admin\AppData\Local\Temp\[Leakcloud.fun] Link Skipper.exe" cmd /c %SIGILL% "SIGTERM|DELETE|SIGKILL"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C powershell Add-MpPreference -ExclusionPath C:\2⤵
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath C:\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82