Overview
overview
8Static
static
34777980294...d7.exe
windows7-x64
84777980294...d7.exe
windows10-2004-x64
8$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3$TEMP/Micr...up.exe
windows7-x64
6$TEMP/Micr...up.exe
windows10-2004-x64
6readest.exe
windows7-x64
1readest.exe
windows10-2004-x64
1uninstall.exe
windows7-x64
7uninstall.exe
windows10-2004-x64
7$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ls.dll
windows7-x64
3$PLUGINSDI...ls.dll
windows10-2004-x64
3General
-
Target
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7
-
Size
9.5MB
-
Sample
250203-wbje8sxrgy
-
MD5
bafd11884a294d93ca3c747fc85fb7ff
-
SHA1
1c0f07cde9b585415f71df3647a30550ee4a754f
-
SHA256
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7
-
SHA512
85e0cab920cfb967167bd75dcf762e78592327f30b1400544ef91a65bec94ec278b9dd17b61af8241bee6616c7396445138ed18cabaab3d96ebcc133a8d3403a
-
SSDEEP
196608:n4bGVVfgV9VHaS/jK2Q+IqDhISJO4c8DuOSBqhx2yrprtV:n4bGVVk9VH5QYhYyiOSXSV
Static task
static1
Behavioral task
behavioral1
Sample
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
$TEMP/MicrosoftEdgeWebview2Setup.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$TEMP/MicrosoftEdgeWebview2Setup.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
readest.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
readest.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
uninstall.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
uninstall.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/nsis_tauri_utils.dll
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7
-
Size
9.5MB
-
MD5
bafd11884a294d93ca3c747fc85fb7ff
-
SHA1
1c0f07cde9b585415f71df3647a30550ee4a754f
-
SHA256
47779802943893d932dc3245c79f7bb9669a41d83d2fc2b194d5dd6331b8fdd7
-
SHA512
85e0cab920cfb967167bd75dcf762e78592327f30b1400544ef91a65bec94ec278b9dd17b61af8241bee6616c7396445138ed18cabaab3d96ebcc133a8d3403a
-
SSDEEP
196608:n4bGVVfgV9VHaS/jK2Q+IqDhISJO4c8DuOSBqhx2yrprtV:n4bGVVk9VH5QYhYyiOSXSV
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
-
-
Target
$PLUGINSDIR/StartMenu.dll
-
Size
7KB
-
MD5
d070f3275df715bf3708beff2c6c307d
-
SHA1
93d3725801e07303e9727c4369e19fd139e69023
-
SHA256
42dd4dda3249a94e32e20f76eaffae784a5475ed00c60ef0197c8a2c1ccd2fb7
-
SHA512
fcaf625dac4684dad33d12e3a942b38489ecc90649eee885d823a932e70db63c1edb8614b9fa8904d1710e9b820e82c5a37aeb8403cf21cf1e3692f76438664d
-
SSDEEP
96:h8dPIKJhMuhik+CfoEwknt6io8zv+qy5/utta/H3lkCTcaqHCI:yZIKXgk+cx6QYFkAXlncviI
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
-
-
Target
$PLUGINSDIR/nsDialogs.dll
-
Size
9KB
-
MD5
6c3f8c94d0727894d706940a8a980543
-
SHA1
0d1bcad901be377f38d579aafc0c41c0ef8dcefd
-
SHA256
56b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
-
SHA512
2094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
SSDEEP
96:o0svUu3Uy+sytcS8176b+XR8pCHFcMcxSgB5PKtAtgt+Nt+rnt3DVEB3YcNqkzfS:o0svWyNO81b8pCHFcM0PuAgkOyuIFc
Score3/10 -
-
-
Target
$PLUGINSDIR/nsis_tauri_utils.dll
-
Size
29KB
-
MD5
c5bd51b72a0de24a183585da36a160c7
-
SHA1
f99a50209a345185a84d34d0e5f66d04c75ff52f
-
SHA256
5ef1f010f9a8be4ffe0913616f6c54acf403ee0b83d994821ae4b6716ec1d266
-
SHA512
1349027b08c7f82e17f572e035f224a46f33f0a410526cf471b22a74b7904b54d1befb5ea7f23c90079605d4663f1207b8c81a45e218801533d48b6602a93dbc
-
SSDEEP
768:jnvg/4R1C7063G5I1CabuqcFKpnq0jdhK7W+q:jvu4RM2WCqYMX/
Score3/10 -
-
-
Target
$TEMP/MicrosoftEdgeWebview2Setup.exe
-
Size
1.6MB
-
MD5
b49d269a231bcf719d6de10f6dcf0692
-
SHA1
5de6eb9c7091df08529692650224d89cae8695c3
-
SHA256
bde514014b95c447301d9060a221efb439c3c1f5db53415f080d4419db75b27e
-
SHA512
8f7c76f9c8f422e80ade13ed60f9d1fabd66fef447018a19f0398f4501c0ecc9cc2c9af3cc4f55d56df8c460a755d70699634c96093885780fc2114449784b5f
-
SSDEEP
49152:2iEx3ZsKgbBPetIhztPqpP0NxVjRLhlcoRZ:2issKgbBOIhzV3RhlcoRZ
Score6/10-
Downloads MZ/PE file
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
readest.exe
-
Size
24.3MB
-
MD5
959201d62787badc5793e367ff00beb0
-
SHA1
d6c16c6f6024e3f7d2029c6b33ca6b919f4d2e24
-
SHA256
a491fb1bb8e5e67311f59f43366439f82a14305a457eae9c0d3dcf57900010b5
-
SHA512
95a562e0e76132df6925d41fbf08bef0728dd8bdf27469d1132042201cdd707baf7ef7bc5694a59872481b80accb2b63094ac96fdffb2be7ae36d3457f59a9eb
-
SSDEEP
196608:yA7Saoqj/5Up3vD40p056obERzyTwO8KQYwkcD4TJgUyAMOYaSzNn:sp3cz56ouy58KQYwiTuOYaSR
Score1/10 -
-
-
Target
uninstall.exe
-
Size
75KB
-
MD5
fb9cafa3e53dc25ac59c6b6b71106ab4
-
SHA1
d80f90cdf166b41c01c6df2a8eca701a41be0e83
-
SHA256
7d4515cf9d6fc26d424a945afabf8ecd291b9ea550e3e8924e01d15c078d9dc9
-
SHA512
d9ef16374ca10a76fc2c5e0faaeb3229f2b6c2720431b704a859839f7898d48b1c71cf0472a919158e1a80e5a61710fe1afbd88c33f49a01b56b19a60f81ff1e
-
SSDEEP
1536:tmsAYBdTU9fEAIS2PEtuOgdLeAyNxm+ZBb6kZANHzxFobK0qE6qwbV:sfY/TU9fE9PEtuOceAn8rUzxFobK016x
Score7/10-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
-
-
Target
$PLUGINSDIR/LangDLL.dll
-
Size
5KB
-
MD5
68b287f4067ba013e34a1339afdb1ea8
-
SHA1
45ad585b3cc8e5a6af7b68f5d8269c97992130b3
-
SHA256
18e8b40ba22c7a1687bd16e8d585380bc2773fff5002d7d67e9485fcc0c51026
-
SHA512
06c38bbb07fb55256f3cdc24e77b3c8f3214f25bfd140b521a39d167113bf307a7e8d24e445d510bc5e4e41d33c9173bb14e3f2a38bc29a0e3d08c1f0dca4bdb
-
SSDEEP
48:S46+/nTKYKxbWsptIpBtWZ0iV8jAWiAJCvxft2O2B8mFofjLl:zFuPbOBtWZBV8jAWiAJCdv2Cm0L
Score3/10 -
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
-
-
Target
$PLUGINSDIR/nsis_tauri_utils.dll
-
Size
29KB
-
MD5
c5bd51b72a0de24a183585da36a160c7
-
SHA1
f99a50209a345185a84d34d0e5f66d04c75ff52f
-
SHA256
5ef1f010f9a8be4ffe0913616f6c54acf403ee0b83d994821ae4b6716ec1d266
-
SHA512
1349027b08c7f82e17f572e035f224a46f33f0a410526cf471b22a74b7904b54d1befb5ea7f23c90079605d4663f1207b8c81a45e218801533d48b6602a93dbc
-
SSDEEP
768:jnvg/4R1C7063G5I1CabuqcFKpnq0jdhK7W+q:jvu4RM2WCqYMX/
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1Privilege Escalation
Event Triggered Execution
2Component Object Model Hijacking
1Image File Execution Options Injection
1