Overview
overview
10Static
static
10Rdp Cracking tool.zip
windows7-x64
10Rdp Cracking tool.zip
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
3Rdp Cracki...g1.exe
windows10-2004-x64
3Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...e4.dll
windows7-x64
3Rdp Cracki...e4.dll
windows10-2004-x64
3Rdp Cracki...i4.dll
windows7-x64
3Rdp Cracki...i4.dll
windows10-2004-x64
3Rdp Cracki...k4.dll
windows7-x64
3Rdp Cracki...k4.dll
windows10-2004-x64
3Rdp Cracki...ts.txt
windows7-x64
1Rdp Cracki...ts.txt
windows10-2004-x64
1Rdp Cracki...ng.cfg
windows7-x64
1Rdp Cracki...ng.cfg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
9Rdp Cracki...g1.exe
windows10-2004-x64
9Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...Me.txt
windows7-x64
1Rdp Cracki...Me.txt
windows10-2004-x64
1Rdp Cracki...ls.txt
windows7-x64
1Rdp Cracki...ls.txt
windows10-2004-x64
1Rdp Cracki...od.txt
windows7-x64
1Rdp Cracki...od.txt
windows10-2004-x64
1Rdp Cracki...rs.txt
windows7-x64
1Rdp Cracki...rs.txt
windows10-2004-x64
1Analysis
-
max time kernel
60s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 20:19
Behavioral task
behavioral1
Sample
Rdp Cracking tool.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rdp Cracking tool.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win10v2004-20241007-en
General
-
Target
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
-
Size
7.8MB
-
MD5
025c1c35c3198e6e3497d5dbf97ae81f
-
SHA1
6d390038003c298c7ab8f2cbe35a50b07e096554
-
SHA256
ffa28db79daca3b93a283ce2a6ff24791956a768cb5fc791c075b638416b51f4
-
SHA512
1d4cf52062b4f1aa9349ee96b234fc51e693ea8231230ec2b35fa896c2c27f47158d6493e26a1881b070b3f86e6c7d9d2ed3f5f161d456eb011551d434e06b50
-
SSDEEP
196608:x0p8Y4DFbBJ5dIa82Vou2j09a3XAydVdODHMD16UAsdf:08YwFV/dIa8wp2j09qXAyYDHMDYrsd
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ NL Brute 1.2 @virusbug1.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NL Brute 1.2 @virusbug1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NL Brute 1.2 @virusbug1.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine NL Brute 1.2 @virusbug1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2388 NL Brute 1.2 @virusbug1.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NL Brute 1.2 @virusbug1.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2388 NL Brute 1.2 @virusbug1.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2388 NL Brute 1.2 @virusbug1.exe 2388 NL Brute 1.2 @virusbug1.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2388 NL Brute 1.2 @virusbug1.exe 2388 NL Brute 1.2 @virusbug1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2388 NL Brute 1.2 @virusbug1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\NL Brute @virusbug1\NL Brute @virusbug1\NL Brute 1.2 @virusbug1.exe"C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\NL Brute @virusbug1\NL Brute @virusbug1\NL Brute 1.2 @virusbug1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2388