Static task
static1
Behavioral task
behavioral1
Sample
32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07
Resource
win10ltsc2021-20250113-en
Behavioral task
behavioral2
Sample
32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07
Resource
win11-20241007-en
General
-
Target
32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07
-
Size
19.7MB
-
MD5
ce82eb90ba675fafe474625727787b07
-
SHA1
2417c11c54c5cfc9cab83e24613bd2934bfc0142
-
SHA256
32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07
-
SHA512
e600f011872ca9b45dff2fcc14400b099a23c5e490060ab5a95715ce56d0c03dcda3fe41458e0c77dd8838f360ea1f1811d089309aabd173a4c55bbbf3619af0
-
SSDEEP
196608:oBVcSNYEv4IGO3ogwCPfAtUD0WhxBCdMNSJ1tfSjYHSww:qt
Malware Config
Signatures
-
Cobalt Strike reflective loader 1 IoCs
Detects the reflective loader used by Cobalt Strike.
resource yara_rule sample cobalt_reflective_dll -
Cobaltstrike family
-
Detected Mount Locker ransomware 1 IoCs
resource yara_rule sample RANSOM_mountlocker -
Detects Zeppelin payload 1 IoCs
resource yara_rule sample family_zeppelin -
HelloKitty ELF 1 IoCs
resource yara_rule sample family_hellokitty_elf -
Hellokitty family
-
MassLogger log file 1 IoCs
Detects a log file produced by MassLogger.
resource yara_rule sample masslogger_log_file -
Masslogger family
-
Merlin family
-
Merlin payload 1 IoCs
resource yara_rule sample family_merlin -
ModiLoader Second Stage 1 IoCs
resource yara_rule sample modiloader_stage2 -
Modiloader family
-
Mountlocker family
-
NetFilter payload 1 IoCs
resource yara_rule sample netfilter_payload -
NetWire RAT payload 1 IoCs
resource yara_rule sample netwire -
Netfilter family
-
Netwire family
-
Remcos family
-
Snake Keylogger payload 1 IoCs
resource yara_rule sample family_snakekeylogger -
Snakekeylogger family
-
XMRig Miner payload 1 IoCs
resource yara_rule sample family_xmrig -
Xmrig family
-
Zeppelin family
Files
-
32de704ba040689746da0da9c8117b0529c5ebec617be63b401ade9c17d9fa07