Analysis

  • max time kernel
    117s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 09:07

General

  • Target

    8f30e6b34003c73c928316fb35c78b8ca90d06bf4824821b9d72224a456fe9d3N.exe

  • Size

    601KB

  • MD5

    0702823b4696e17e1b40228daa7000b0

  • SHA1

    3df320690b1c03aed4e51b50147bc19fced14825

  • SHA256

    8f30e6b34003c73c928316fb35c78b8ca90d06bf4824821b9d72224a456fe9d3

  • SHA512

    38920fa6033df408526a241ce7e96b634ae611355d837fe3b2f7b93272f7c5433027e053fec260add59d34e175c5fedb1bfa0c6ac10909adf098c50c1dec6d76

  • SSDEEP

    12288:9Mf7R8B9JnN+gXdoMRMMsFck339ByRzffM:927R8B7nxRRMMqckdBcLf

Malware Config

Signatures

  • Expiro family
  • Expiro, m0yv

    Expiro aka m0yv is a multi-functional backdoor written in C++.

  • Expiro payload 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f30e6b34003c73c928316fb35c78b8ca90d06bf4824821b9d72224a456fe9d3N.exe
    "C:\Users\Admin\AppData\Local\Temp\8f30e6b34003c73c928316fb35c78b8ca90d06bf4824821b9d72224a456fe9d3N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2008-0-0x0000000001000000-0x00000000011B2000-memory.dmp

    Filesize

    1.7MB

  • memory/2008-1-0x0000000001003000-0x0000000001005000-memory.dmp

    Filesize

    8KB

  • memory/2008-2-0x0000000001000000-0x00000000011B2000-memory.dmp

    Filesize

    1.7MB