Overview
overview
10Static
static
35cff833cda...b0.eml
windows11-21h2-x64
8Request fo...df.rar
windows11-21h2-x64
1Request fo...df.exe
windows11-21h2-x64
10$PLUGINSDI...em.dll
windows11-21h2-x64
8Axonolipa/...ng.jpg
windows11-21h2-x64
Axonolipa/...ne.jpg
windows11-21h2-x64
Axonolipa/...sk.jpg
windows11-21h2-x64
Axonolipa/...ng.jpg
windows11-21h2-x64
Axonolipa/...ed.aff
windows11-21h2-x64
3Axonolipa/...es.jpg
windows11-21h2-x64
Axonolipa/...ck.jpg
windows11-21h2-x64
Axonolipa/prud.jpg
windows11-21h2-x64
Axonolipa/rgerrig.jpg
windows11-21h2-x64
Hetairas/S...ls.jpg
windows11-21h2-x64
Hetairas/Vivacity.ove
windows11-21h2-x64
8Kierkegaar...er.voc
windows11-21h2-x64
8Kierkegaar...or.huk
windows11-21h2-x64
3serpently/...de.pro
windows11-21h2-x64
8serpently/nacry.jpg
windows11-21h2-x64
serpently/...de.jpg
windows11-21h2-x64
email-html-1.html
windows11-21h2-x64
8General
-
Target
Request for Quotation-password(YmNUzkQ6).zip
-
Size
1.0MB
-
Sample
250210-zhl2gsxmb1
-
MD5
48120e3131a644eb838a0ac10db5b335
-
SHA1
f5622f5305b091cfbe625ddc2148055836299f03
-
SHA256
adf56f3ecfe4c24602fa46f3d844160218b6851cbdfadbf9bd0c26cdcac972ff
-
SHA512
9aecfc04f81cc03fa5ace8501a34e41db5c11ac0b9c8624fb9edbefb3e4cbca0aef3105e33d5cc33b23940d8fd6ff089eede09f075bee4c34fd3c7ce06ed7479
-
SSDEEP
24576:KDlm6cHito6uy2ww/btGQSgpI+to7rsGQ+7YCtPw:KUHjy2N3Sb+Es3+TtI
Static task
static1
Behavioral task
behavioral1
Sample
5cff833cda140c94102c03839ebfbfbe7ccd8402fc8ced1d1c3ee43441ecddb0.eml
Resource
win11-20250210-en
Behavioral task
behavioral2
Sample
Request for Quotation_TT10102025_pdf.rar
Resource
win11-20250210-en
Behavioral task
behavioral3
Sample
Request for Quotation_TT10102025_pdf.exe
Resource
win11-20250210-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win11-20250210-en
Behavioral task
behavioral5
Sample
Axonolipa/pinacocyte/starving.jpg
Resource
win11-20250210-en
Behavioral task
behavioral6
Sample
Axonolipa/pinacocyte/statuerne.jpg
Resource
win11-20250210-en
Behavioral task
behavioral7
Sample
Axonolipa/pinacocyte/tatarisk.jpg
Resource
win11-20250210-en
Behavioral task
behavioral8
Sample
Axonolipa/pinacocyte/udsortering.jpg
Resource
win11-20250210-en
Behavioral task
behavioral9
Sample
Axonolipa/pinacocyte/undisposed.aff
Resource
win11-20250210-en
Behavioral task
behavioral10
Sample
Axonolipa/pinacocyte/urremmenes.jpg
Resource
win11-20250210-en
Behavioral task
behavioral11
Sample
Axonolipa/pinacocyte/wollock.jpg
Resource
win11-20250210-en
Behavioral task
behavioral12
Sample
Axonolipa/prud.jpg
Resource
win11-20250210-en
Behavioral task
behavioral13
Sample
Axonolipa/rgerrig.jpg
Resource
win11-20250210-en
Behavioral task
behavioral14
Sample
Hetairas/Skrabnsespils.jpg
Resource
win11-20250210-en
Behavioral task
behavioral15
Sample
Hetairas/Vivacity.ove
Resource
win11-20250210-en
Behavioral task
behavioral16
Sample
Kierkegaardske/Afvarsler.voc
Resource
win11-20250210-en
Behavioral task
behavioral17
Sample
Kierkegaardske/Lithotriptor.huk
Resource
win11-20250210-en
Behavioral task
behavioral18
Sample
serpently/linielngde.pro
Resource
win11-20250210-en
Behavioral task
behavioral19
Sample
serpently/nacry.jpg
Resource
win11-20250210-en
Behavioral task
behavioral20
Sample
serpently/opvkkede.jpg
Resource
win11-20250210-en
Behavioral task
behavioral21
Sample
email-html-1.html
Resource
win11-20250210-en
Malware Config
Targets
-
-
Target
5cff833cda140c94102c03839ebfbfbe7ccd8402fc8ced1d1c3ee43441ecddb0.eml
-
Size
1.0MB
-
MD5
39d04d023805b8d85d484f69eb311755
-
SHA1
b859e0b0ca718e7e907afb00201d4076c3a7d739
-
SHA256
690399f94d9c41cc62ec218ffb47c998bdf671f4a6bc4431d070d16696ba5c64
-
SHA512
a19bd818d4294ead0790eabf7e632a3ec7ebdd1a422285d0ecb2b8084e9654ce22fc49eaabc37d80abdf60e230d77864fa8028de438cbe9baf4d9ba57ed1dbbc
-
SSDEEP
24576:pVxkAQ3+V3cgwODcbgibt0TNx4W5jWIgcEsh5EA1HkIMS5rx:xZQO9MzrCTN8It1sAx
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Request for Quotation_TT10102025_pdf.txz
-
Size
745KB
-
MD5
a787fb9148d780d288fe001a294df246
-
SHA1
7e7f638b8c51f44836c70bee53672e4f6fbf1980
-
SHA256
fac8faa522eb3ee0f654903444415c8d45904296a3cea38f0208070386888caf
-
SHA512
4b9989c97707043c0be040b42443f0bc07524e53c542bb4909ad641d42e0d5c693470a55f8ced109c5dc8ec17d6e62f8d816679ea285d2f58de7081ba3c81e7c
-
SSDEEP
12288:3hCYGnbd7LB0vL3u84okQPjz7VkPPWoc+1KH23TJVaH6sxJQcaF7C6:3kYKh7V0vL3zZPRdox53Hm6
Score1/10 -
-
-
Target
Request for Quotation_TT10102025_pdf.exe
-
Size
867KB
-
MD5
cc927d1efa24a3e2bbce49f12c3398b3
-
SHA1
cddc057ccece5b12599120e3a39d0f0d16e24082
-
SHA256
edbd20bf11d0af152bf3e62450f012f95a2068664e90b7384929732c0dca5cb5
-
SHA512
a941f0d338b2ab60d32bd2106bbdb86614e93d160eaf50e0c74a34435d5f8f2cc019b822f8595c7e24c9050687fca4b7d585c8bf166b3a1386182a839454f21a
-
SSDEEP
24576:Q4nbY9dZZZZZZZZZZyHsAmOaLH2xihEzJvvV3HQmhQ436/zu:Q+qZZZZZZZZZZ+sApE5hEzJvv1wzq6y
-
Guloader family
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
d6f54d2cefdf58836805796f55bfc846
-
SHA1
b980addc1a755b968dd5799179d3b4f1c2de9d2d
-
SHA256
f917aef484d1fbb4d723b2e2d3045cb6f5f664e61fbb3d5c577bd1c215de55d9
-
SHA512
ce67da936a93d46ef7e81abc8276787c82fd844c03630ba18afc3528c7e420c3228bfe82aeda083bb719f2d1314afae913362abd1e220cb364606519690d45db
-
SSDEEP
192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw
Score8/10-
Downloads MZ/PE file
-
-
-
Target
Axonolipa/pinacocyte/starving.jpg
-
Size
21KB
-
MD5
2475386fd6465cb63552c04518117cc6
-
SHA1
5962256529202cca6a2e643bfdad222346d69f8e
-
SHA256
239ec6d95e63166c4dc153e96593619c58e58578be24c85f10ac0a81fe9bdda7
-
SHA512
d50bd6a82ba31d495ed031d4db484a002d7edc4ac5ea7754eab1ccfefd93a84cc3252dee4b5a2bb610b4e9491c3c3a8e8425fe0c402aaee30964455836dcc635
-
SSDEEP
384:vw8+ayqZ4ALy8VWjmIZvsp0eeaILupt6JnHovz+KlNSjuIh2aXBTonNRWG:vw8+5Au8Qw0naoupmhh2U0NX
Score1/10 -
-
-
Target
Axonolipa/pinacocyte/statuerne.ini
-
Size
6KB
-
MD5
3831c556867d436a133a9b5fdf79684b
-
SHA1
13ae2213b073f3196abb859e38f83f95555b3938
-
SHA256
78a17c216a3bf8284794d00947540106614d492d316c77551f4ef1ba6c5c0a62
-
SHA512
2d52b046644156640f2fbf925c1bbf6b3711c1f0aa884382ae7f7cccde950faa308ad2e25f70c8c8dc4a3462cd874204fbf1cb07f6e96e08e2fd3c1e5fdeba92
-
SSDEEP
192:LmUYxmVeZsegZLmEg6wDlUacWkDzGaJIPSTSI:yxQemZLzg66lqDyavSI
Score1/10 -
-
-
Target
Axonolipa/pinacocyte/tatarisk.jpg
-
Size
65KB
-
MD5
253fba4328c0bd2a6a545b30a3eb2774
-
SHA1
7fe8f395af1d8830f75e7e745aeb2cdde9f0e061
-
SHA256
600306a1abc1cb0582dc243c1488739470f08244fac2576714b3503c6059cb19
-
SHA512
046cb1b41f366b88960afe4eb841fdb07ab4ac76627141149c0202111912f8df2c13182d5fe8b7afed553920bfb60bc0a496aad138bb9f18f1515a6e5f59756e
-
SSDEEP
1536:MQJM3Mn2nS9V8F1ybMLoh7C6dwFRWjVlcc3YWw3twgMkNfTr1:TJM3Mn2n88FMMXewFRecKYTr1
Score1/10 -
-
-
Target
Axonolipa/pinacocyte/udsortering.jpg
-
Size
11KB
-
MD5
93066b05f4d44458fca79ae8f224eb61
-
SHA1
53aed2782bdced333a43b4ba2e44626be9523a7d
-
SHA256
d201c46604ea15c19901f24f0effc0e0c1092b20a979ddbbf44775aea7114400
-
SHA512
12d6f4cb1f2a5f6ac4dd4994317ca3020bedd4f51b2ed8cc5a2a1bd684d9b8a1914f0645754578ca8c45ae531cab09ab9b21b9d471481eab42e283ce172044db
-
SSDEEP
192:L1qavgSgIA/UZ1bEqNSc6nEKFL+2Q8TPwnMPW/77/JC6eRz+3E37HAYCRn:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/p
Score1/10 -
-
-
Target
Axonolipa/pinacocyte/undisposed.aff
-
Size
199KB
-
MD5
dd342206ff527188a6c6170732d0546a
-
SHA1
3557869f7de168b288da8386a1ef6db5e2477fc9
-
SHA256
f5c8afdd60c6c815f21560765af73ede0da98573a9da398467abdce30e994c9b
-
SHA512
421b988bc9d5356f402cf4bae5816e78cd28d35931c0667ce7947b06b65131f5e95adad485a11564c5c8627ac7fe279452ebad1b917e0fec53796c913f19ad74
-
SSDEEP
768:WXmsv9pSjlQaOvcHQi1qS+9i5JytPRctWMP7yOWS7twXm8kQhMjORtOyc1oH27xH:sqYcPpyRYDNVE4F9x
Score3/10 -
-
-
Target
Axonolipa/pinacocyte/urremmenes.jpg
-
Size
6KB
-
MD5
4ea3437e960b9e8f828b52d8d4f3f1ab
-
SHA1
b3320414e43ec606e7dd397a365bfcde9a794008
-
SHA256
15107dddca248ed0d61a5e1e38846406e3605bb49042d7c9f98c54bc8c00d0fc
-
SHA512
da0be4d89c7afc5f2cdeac99affa420107b2aaa1ad9393c87506c09b062367329e30e796677939e76f0c8f8f8c924af309c7f0fbebfc6d249fa9cfadfb6988b6
-
SSDEEP
192:LmUYxmVeZsegZLmEg6wDlUacWkDzGaJIPSTSj:yxQemZLzg66lqDyavSj
Score1/10 -
-
-
Target
Axonolipa/pinacocyte/wollock.ini
-
Size
14KB
-
MD5
014e3a9b91f05d3500163479b611d3b8
-
SHA1
54fe4cc79edc9158616d5067516ec3ac21e68f06
-
SHA256
44693d40851185e37036c2164e23850dc7ad163b55ac0289d7b11ab3257164c5
-
SHA512
effe15a7a31cc924bd48871a89b83cfd27f4c04a548e6bfdf14f78f0db34e109287121b11640cddaf756314da82316cb06ae59bb6a9181a2030f5253ff9931e4
-
SSDEEP
384:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/jHgNi:J/sUZUEu1Qht7Y2L
Score1/10 -
-
-
Target
Axonolipa/prud.jpg
-
Size
58KB
-
MD5
5c84afa67cd76d69e53e6e8af66eb94a
-
SHA1
786e28bce32c44e621bbd1390a2f55e08a6b6ae1
-
SHA256
0e75c6649c3a5b5a7e590c6fb72048c8da6cf5095222fb72ad2e51528c62b2dd
-
SHA512
9543b72abc6a9ccf1a2b6bc3f383facfc73ce55a79e59537fa4aa1351e8e08541ada34949f4f42b7244f681c8e3958561987fcd423cbad8599d217ab2a3e25f9
-
SSDEEP
1536:UmJekwHrnQiUOTxPs1aLh3VMeV8lTCw8dGsBs7TdMZUzoUoR:pgLhlBF7Tw8osa7TdMZUEUO
Score1/10 -
-
-
Target
Axonolipa/rgerrig.txt
-
Size
13KB
-
MD5
ded55c4e40d3bb009f6d039c604786e9
-
SHA1
8ca3d9c7f53f3cc2afd3a1efe10e79d265747dcd
-
SHA256
41e704df5363ec94adece028466fc7b8cc8ae4753bc5e722871497c759e60f81
-
SHA512
6ba2152bbefdf8cb07bc063c460ab909ad65033a3f51e796c22a9529867d7d81bb0ad05b2bcee7606a6eccb7bf4a11b70603a5f574d1733c4615fa8c0fd2b202
-
SSDEEP
192:L1qavgSgIA/UZ1bEqNSc6nEKFL+2Q8TPwnMPW/77/JC6eRz+3E37HAYCRuCeKchK:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/jH/
Score1/10 -
-
-
Target
Hetairas/Skrabnsespils.txt
-
Size
12KB
-
MD5
c16d7e9cdd76e6c6a6c2c55a3df4c22f
-
SHA1
a8ff93f63cef29df4dc4c9908a98b39cfe2d0f77
-
SHA256
fa7b89de19926538de22efffa7556d3b887804b9ee59481efe13042ebc2a7622
-
SHA512
dbee6c0092d6dcdd38b1e782fb862d09a93fecc722e16240e531c53f9b6d83d1c8313cf927ce89d74fc9371e2f5cfec88a98b0a8fa0b5d36a6e5cb85b0a533fc
-
SSDEEP
192:L1qavgSgIA/UZ1bEqNSc6nEKFL+2Q8TPwnMPW/77/JC6eRz+3E37HAYCRuCeKc5:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/je
Score1/10 -
-
-
Target
Hetairas/Vivacity.Ove
-
Size
128KB
-
MD5
1b911424ddeb8feb6d284ab17d8444ad
-
SHA1
8a2ecb5b78d23855e86f7d78e232482c2497c850
-
SHA256
526786cac3bc3160f1bcce8f396e95f9a698a7cfa5f05c3319965fa9250347b0
-
SHA512
d7935245ea41e6308e52ba38143be7d6b342642186d2c9d550f95e8af81e2322d8d90a82f07c942aa1905ef0a672fe08d4b1fb7d2c51ebd49a96f295345eb3c2
-
SSDEEP
1536:D2FNb5L/ODKN1zKagjK23JWm73jpDmxCQcYZimTu3e1GK3jEn4vG:qFhu88vO23Jn7TpDQcYZgwl3jRvG
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
Kierkegaardske/Afvarsler.Voc
-
Size
261KB
-
MD5
e1952b65b5492ae819e2094798fc7ee0
-
SHA1
4a0798b2157e8f4aa2d48f593f2fedb8f5534393
-
SHA256
2e0361f0e95687ce8aa8a99e3b47a2566e6181b6281eaf14866695da397618e8
-
SHA512
73f08396e28d4e6fe145c62b5f56c40aeb3c7c80d9e407f02f4ac1f3fa90fe7e9137c2a904fe28bf6965f90f3b47a0745ed4b1aee0e7a97948ad749ebd647dd2
-
SSDEEP
6144:jeOAbR+HadZ7/HmNaB/FhPwahOGzi+TFxzrFg6MhkgAQ3cw11:j/U+aFeNkPrhFTEhTAQ3cw11
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
Kierkegaardske/Lithotriptor.huk
-
Size
184KB
-
MD5
f342e7ba488be2ac57bb244f6048bb39
-
SHA1
7c3121e57e1b8cf1e9bd7836b7ba3161418220d9
-
SHA256
8d060a3f682c8d5b044dae09b37afda95cb21753bbb23f7a5b0dc2c8e4f63762
-
SHA512
1b0cffcfb59c8bb0b2ead98e22c7a25f4c70444fa4f747df3ba4096a1415f7d8bc4e5c4992937a3d3a7fef7d1a5c20da38361cfd3f824c242f07d299b4b7d888
-
SSDEEP
768:IucEIs7WGo6HKuvpy6wIG5fNvBoJKc5ius4Ky9KqSGzMM4ClF0oHXpOKm9rD3QcM:J1JGpI5fKGKMVftlYXIL8y
Score3/10 -
-
-
Target
serpently/linielngde.pro
-
Size
330KB
-
MD5
3c9245261ab5761879ee306e1f5fd738
-
SHA1
5d39971ba7fc8c1a840b772b3f0970656770ca8b
-
SHA256
af7641e47f4ae7bb1720749ac9c8d9bc00586a88aabfc8da07ab33850f1ac664
-
SHA512
87325164fda0f2d76856d08565aefa4b02540f85d16ee723224dec34a3b73f3b264cf510a45cefc9ddab6cce508dd11dfc36a0e8d52f8bea927b2e5b7a0a494b
-
SSDEEP
1536:GepnQBvtfYcZNZRoH8bZHp4oI0kQkYiPGN:TpnUVf7XPDcolbkYiPA
Score8/10-
Downloads MZ/PE file
-
-
-
Target
serpently/nacry.ini
-
Size
11KB
-
MD5
d238caece8765bf9760626569559bf74
-
SHA1
a2f3aa1bb52db3315b83fc1a830cb45b725f88f6
-
SHA256
426e8b9e2fac611da0286e2f41ec92b725ad2e4d8b9c2b87718ef81f9281390d
-
SHA512
0de0df60ddcbf02cc313ae836848dd8e079e3cc68cd5980bfeb1257443924aa70196c727c32d2923c090dcac2bd7a932da5315c3a3206f52f9966ba2abd9e189
-
SSDEEP
192:L1qavgSgIA/UZ1bEqNSc6nEKFL+2Q8TPwnMPW/77/JC6eRz+3E37HAYCRuA:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/7
Score1/10 -
-
-
Target
serpently/opvkkede.ini
-
Size
13KB
-
MD5
36fcd7598115fda310bc57936d594a17
-
SHA1
3486b8ba6ab5719af1eada21fe6e090adceeb0e0
-
SHA256
d6c9dadc5dcfec9e635c54e1dd3ad5b9454e44ea6968e5ec28fc3908a99552aa
-
SHA512
37772c27e1b907c460273c46916cc00651c22d1e0aacf1535db05ced7c8ced0a6d5a660a6538dd00655d1ef1011fb5dc127c46e2057b4057952c6c94531cf031
-
SSDEEP
384:JXvgSgIuUkc6nEuS2Q8TPwn8o7YW/jHgd:J/sUZUEu1Qht7Y2e
Score1/10 -
-
-
Target
email-html-1.txt
-
Size
29KB
-
MD5
9faaa98c874aad1ffb728ad4742ac742
-
SHA1
2d19e9db61931b603f7a73576bdb215d7c453aaa
-
SHA256
98978f7f19737b9781bd94970ae83a388a3aec6d9133899c20769ee90e253977
-
SHA512
5598a2c288e9c69c6a1c45298c6a06bcf7fd247b5e428bb5061a53e5502eaaa9cb45fbca5eecb4b0f3a109d8b96f9b9af418a5c9cfcaa8cfbcbf2103b223be9c
-
SSDEEP
768:IyoLQVLsz0qdOYm5T/sCEn75+NtWtXdCH+jDfRYEFEYQ:Ix8xwALT057ENUKHaGcQ
Score8/10-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1