Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 04:46

General

  • Target

    8b09ca49e3fe47fcde6da6711ebce9e3e09558d7c3091c121fb63b7d8bf35545.exe

  • Size

    725KB

  • MD5

    ce739a6a48d1fdb37c8d017e7376184f

  • SHA1

    3df5303e08681b62bf74be3e86b5375273488923

  • SHA256

    8b09ca49e3fe47fcde6da6711ebce9e3e09558d7c3091c121fb63b7d8bf35545

  • SHA512

    1ab5ee8900e516a355a406168921b5f000a413743f2636ea31a6a82299a61a9119c28bb1288868ce32c70cf08c64f68822a551aa64df9abba9f5a0f733ab9bee

  • SSDEEP

    12288:cDQ1nScI+uWduLDtQOczWl7IJmsUHp+gM++aCppbiko5r7H5QQt32SxGn0xYUxBv:IQ1nfZdPPzwU/bVotZQU0uYQAVgXJwqw

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b09ca49e3fe47fcde6da6711ebce9e3e09558d7c3091c121fb63b7d8bf35545.exe
    "C:\Users\Admin\AppData\Local\Temp\8b09ca49e3fe47fcde6da6711ebce9e3e09558d7c3091c121fb63b7d8bf35545.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2776-0-0x0000000001000000-0x000000000127E000-memory.dmp

    Filesize

    2.5MB

  • memory/2776-1-0x0000000001019000-0x000000000101A000-memory.dmp

    Filesize

    4KB

  • memory/2776-2-0x0000000001000000-0x000000000127E000-memory.dmp

    Filesize

    2.5MB