Overview
overview
10Static
static
10Rdp Cracking tool.zip
windows7-x64
10Rdp Cracking tool.zip
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
3Rdp Cracki...g1.exe
windows10-2004-x64
3Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...e4.dll
windows7-x64
3Rdp Cracki...e4.dll
windows10-2004-x64
3Rdp Cracki...i4.dll
windows7-x64
3Rdp Cracki...i4.dll
windows10-2004-x64
3Rdp Cracki...k4.dll
windows7-x64
3Rdp Cracki...k4.dll
windows10-2004-x64
3Rdp Cracki...ts.txt
windows7-x64
1Rdp Cracki...ts.txt
windows10-2004-x64
1Rdp Cracki...ng.cfg
windows7-x64
1Rdp Cracki...ng.cfg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
9Rdp Cracki...g1.exe
windows10-2004-x64
9Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...Me.txt
windows7-x64
1Rdp Cracki...Me.txt
windows10-2004-x64
1Rdp Cracki...ls.txt
windows7-x64
1Rdp Cracki...ls.txt
windows10-2004-x64
1Rdp Cracki...od.txt
windows7-x64
1Rdp Cracki...od.txt
windows10-2004-x64
1Rdp Cracki...rs.txt
windows7-x64
1Rdp Cracki...rs.txt
windows10-2004-x64
1Analysis
-
max time kernel
361s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-01-2025 20:19
Behavioral task
behavioral1
Sample
Rdp Cracking tool.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rdp Cracking tool.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win10v2004-20241007-en
General
-
Target
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
-
Size
191KB
-
MD5
47e24bb0723a41606259b71c34b2e5e2
-
SHA1
dec3e4e1509d293058848d53af25b0cfba804cdd
-
SHA256
476c5a362a758bca9ac441b673cd0777982ea3a6ca13b4299c3ff15c780262a4
-
SHA512
a125b431e2add3e74eb58d3abe26063ab8d846e625c144ecee6dc1ef599b1dd783ef5757c9dfa37e446210649b6426575333b4607db523ad7bd556fc60ef7d96
-
SSDEEP
3072:FwYXnaz7fOTkQTwokTqLIOt6r+9dEPlUIbrMOFTfM0OZhEt3hjOrX7a0K2gY7fq2:y+naz7OTkNPTqLIOt6r+9dEPlUIbrMOE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KPortScan3 @virusbug1.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2616 KPortScan3 @virusbug1.exe 2616 KPortScan3 @virusbug1.exe 2616 KPortScan3 @virusbug1.exe 2616 KPortScan3 @virusbug1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\KPortScan 3.0 @virusbug1\KPortScan3 @virusbug1.exe"C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\KPortScan 3.0 @virusbug1\KPortScan3 @virusbug1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2616