Overview
overview
10Static
static
10πποΏ½...οΏ½οΏ½).7z
windows10-2004-x64
8All Files/...ll.dll
windows10-2004-x64
8All Files/...RT.dll
windows10-2004-x64
8All Files/...es.dll
windows10-2004-x64
8All Files/...ar.exe
windows10-2004-x64
6All Files/...32.dll
windows10-2004-x64
6All Files/...re.pkg
windows10-2004-x64
8All Files/...ar.dll
windows10-2004-x64
6All Files/...me.dll
windows10-2004-x64
8All Files/...re.dll
windows10-2004-x64
8All Files/...tp.exe
windows10-2004-x64
6All Files/...017.js
windows10-2004-x64
8All Files/...st.dll
windows10-2004-x64
8All Files/...ng.dll
windows10-2004-x64
8All Files/...er.exe
windows10-2004-x64
6All Files/...64.dll
windows10-2004-x64
8All Files/...556.js
windows10-2004-x64
8All Files/...ts.dll
windows10-2004-x64
8All Files/...ed.dll
windows10-2004-x64
6All Files/...tp.exe
windows10-2004-x64
6All Files/...32.dll
windows10-2004-x64
6All Files/...pa.dll
windows10-2004-x64
8All Files/...sm.dll
windows10-2004-x64
8All Files/...ble.js
windows10-2004-x64
8All Files/...dor.js
windows10-2004-x64
8All Files/...xt.exe
windows10-2004-x64
8All Files/...nv.exe
windows10-2004-x64
8All Files/...sh.exe
windows10-2004-x64
8All Files/...-2.dll
windows10-2004-x64
8All Files/...sm.dll
windows10-2004-x64
8All Files/...32.dll
windows10-2004-x64
6All Files/...58.dll
windows10-2004-x64
6General
-
Target
πΎπ€π’π₯π‘ππ©πππΏπ€π¬π£π‘π€ππ+πππ©πͺπ₯_(πΈπΆπΈπ»).zip
-
Size
44.6MB
-
Sample
250213-adthbs1jbt
-
MD5
eae56879fdf409a70b0bf4e0730e99d9
-
SHA1
9da60aaed3bb7b2150dae7be1fe954ff3d79d6cf
-
SHA256
901884e985e590851ff222852431adae8373029c703ef7587186fd961ad83be6
-
SHA512
5577f298f601820e6bd91874c5fd00d810507c261dd03498b9db352cbfdcc842190e4e3ddcaef1798150a7ecced6a24a1be47a3ef8700e8606e50ad0738828fb
-
SSDEEP
786432:A/lDESg/aC+n09Tzef95bXRqE9qz2ABF4wD6VpFbTrKrOz1N:KmS2SQzgQ6tfOyL
Behavioral task
behavioral1
Sample
πππππΌπππΎππππ+ππΎ_πππππ_(πΈπΆπΈπ»).7z
Resource
win10v2004-20250207-en
Behavioral task
behavioral2
Sample
All Files/Assets/Backup/ICQLiteShell.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
All Files/Assets/Backup/ICQRT.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral4
Sample
All Files/Assets/Backup/Language/LiteRes.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
All Files/Assets/Backup/Language/WinRar.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral6
Sample
All Files/Assets/Backup/Language/madHcNet32.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
All Files/Assets/Backup/Language/nolimetangere.pkg
Resource
win10v2004-20250207-en
Behavioral task
behavioral8
Sample
All Files/Assets/Backup/Language/unrar.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
All Files/Assets/Backup/cgame.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral10
Sample
All Files/Assets/Backup/fullware.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral11
Sample
All Files/Assets/Backup/izanptp.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral12
Sample
All Files/Assets/Data/017.js
Resource
win10v2004-20250207-en
Behavioral task
behavioral13
Sample
All Files/Assets/Data/EppManifest.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral14
Sample
All Files/Assets/Data/NuGet.Packaging.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral15
Sample
All Files/Assets/Data/StartupHelper.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral16
Sample
All Files/Assets/Data/TMRegEx64.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral17
Sample
All Files/Assets/Data/bug18556.js
Resource
win10v2004-20250207-en
Behavioral task
behavioral18
Sample
All Files/Assets/Data/insights.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral19
Sample
All Files/Assets/Data/installed.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral20
Sample
All Files/Assets/Data/izanptp.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral21
Sample
All Files/Assets/Data/lowSshC32.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral22
Sample
All Files/Assets/Data/mc_enc_mpa.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral23
Sample
All Files/Assets/Data/msm.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral24
Sample
All Files/Assets/Data/portable.js
Resource
win10v2004-20250211-en
Behavioral task
behavioral25
Sample
All Files/Assets/Data/test_vendor.js
Resource
win10v2004-20250211-en
Behavioral task
behavioral26
Sample
All Files/Assets/MigrationService/legal/bin/odt2txt.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral27
Sample
All Files/Assets/MigrationService/legal/bin/sexp-conv.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral28
Sample
All Files/Assets/MigrationService/legal/bin/wish.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral29
Sample
All Files/Assets/MigrationService/libsmi-2.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral30
Sample
All Files/Assets/MigrationService/msm.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral31
Sample
All Files/Plugins/cache/Language/madHcNet32.dll
Resource
win10v2004-20250211-en
Behavioral task
behavioral32
Sample
All Files/Plugins/lang-1058.dll
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
πππππΌπππΎππππ+ππΎ_πππππ_(πΈπΆπΈπ»).7z
-
Size
44.4MB
-
MD5
7da0277ee99475887edbb62a43a760ca
-
SHA1
4ebd6df5620a6c8d92f695af85df7c0623c21aeb
-
SHA256
d4c2d2ff11563416c5eb7a456af7ff1b7ac9d8ae6bcb668e969b9027c4844c41
-
SHA512
fce720c5d51d962599e1976fe920a48289ca7ad5c982d8b7a5bff1e98ba3bd50d383ebc18bd4ca3e0c9039ffc8b4d27ed1fe4d5caa6788f542b45db14e47ae83
-
SSDEEP
786432:S/lDESg/aC+n09Tzef95bXRqE9qz2ABF4wD6VpFbTrKrOz1w:4mS2SQzgQ6tfOy6
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Assets/Backup/ICQLiteShell.dll
-
Size
56KB
-
MD5
05e61539b8917fca37c03756bbdd043d
-
SHA1
5a72e0e528260de0ea5b34badb9e5f9873cb4245
-
SHA256
515c8e0b93f0fef15da3e2573ad92b7e7840374140e65e5d73df63d8e22cb3e8
-
SHA512
565d57783e6044d6e7e2026c79dbd897e637c5e1d96e7930dc704ef2b6d801669b38f0c26382f00e67e26668439274941e937a0ade54666de50b5d84f6da7e97
-
SSDEEP
768:YEGJ9blT7XZBSbHwJU+tGR0KZUyGKZ0ZgwmF1+3UVambg:YEGJ9bln5o0KZjGKZ0Z1mF1+3UVayg
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/ICQRT.dll
-
Size
32KB
-
MD5
1aedcb8994d6ad63ef9dcb87016e028f
-
SHA1
f5b891aa15c6353b681bdb7e2d96c6ac8a5f02d7
-
SHA256
53e1f40144bab532f9700ff25ec3d5c6a39784a98e17fada583b4ee6d9dd5dbc
-
SHA512
89c0f408797c4d78afc52335a9e162345c614e1e419f55487cb358c14f7a69ec82138a7e6250be3133233386ba3659d241e80ab63c9b972b6c8b26b0424cb0c8
-
SSDEEP
384:+qtTeds1tkMAp4TxCW9su5UcSu93ggoXUQQIPGEANHl:FTedukelF95RjQUUPpANHl
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/Language/LiteRes.dll
-
Size
735KB
-
MD5
88962410244bc5c03482b82a7e3cb5e1
-
SHA1
4622be2d3deda305bf0a16c0e01bc2ecf9d56fad
-
SHA256
afa884228afc5c05f4b47e90b6de42854d5a8886ec5ed15a253faeccd5309036
-
SHA512
c6e7667f91c1439e33ad4d9e2052b7c9fcc3ca2c7688d9e2bc0550b71a5762b76aa76427331df0217429d9bd984925997c7a8d009f25e44e2776c5ce7cc9d98c
-
SSDEEP
6144:x9Ej/jb82/HRoXO1q2pt+Mc1/PDPicsUzM+gYESoE/wOuET8F62bH5vnGfcJvl+b:fqptG/PDPo0no2Iq8F6CHBTWqU
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/Language/WinRar.exe
-
Size
3.2MB
-
MD5
b66dec691784f00061bc43e62030c343
-
SHA1
779d947d41efafc2995878e56e213411de8fb4cf
-
SHA256
26b40c79356453c60498772423f99384a3d24dd2d0662d215506768cb9c58370
-
SHA512
6a89bd581baf372f07e76a3378e6f6eb29cac2e4981a7f0affb4101153407cadfce9f1b6b28d5a003f7d4039577029b2ec6ebcfd58e55288e056614fb03f8ba3
-
SSDEEP
98304:lJXOBfK92HbAw0CNB3kJElzNsy8vGUvfCo3ABH43:lJ192HbAXCvDlzNsy8vGUyo3AB8
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/Language/madHcNet32.dll
-
Size
921KB
-
MD5
d22b9da713ab36102c9c3d812af8c12d
-
SHA1
371fdbf6ae6a9a2e5c0560fc94eba3290028a252
-
SHA256
95b538b47e02d0ad2bd15d47efc18695d5e379ef61568b81ef405773d9c199bb
-
SHA512
e5ae51f79403358af60bb3ea663251badac57414813f5537d763b0b95504a393fb2d34c94c4b7328ec13f58e74a7147d3a72e63e62973c4c5d80671be1c8face
-
SSDEEP
24576:TlUbWq3/gquYUJ4Vgv0eUnDaE0efxfXT95:pUR4quYUJ4VgceXE0gxfjv
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/Language/nolimetangere.pkg
-
Size
779KB
-
MD5
2ba2923d166e89451fab8b0f1f48a552
-
SHA1
a3b8226b8fc5266105347ccb623500750a1b561e
-
SHA256
51e588e5c974cbb81b3c22ed4ba9c7188dc057a2bd77b248f4eec4babcf23761
-
SHA512
71207bb1493412737ee821754f154b76e45ee73be539f7df7e188e18cc018a45c42312844322f5bf0d8352cb3ee432f1314d8c69e458cbec25c9b47a5bf7bb0a
-
SSDEEP
12288:y2eLUppvK0pIw10hf2SZCFILyTVAtIeH6b5+zoTcefCDlNxEawbSSWZ3O:B3e1nGepfH6bCe6pNQvq3O
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/Language/unrar.dll
-
Size
304KB
-
MD5
851c9e8ce9f94457cc36b66678f52494
-
SHA1
40abd38c4843ce33052916904c86df8aab1f1713
-
SHA256
0891edb0cc1c0208af2e4bc65d6b5a7160642f89fd4b4dc321f79d2b5dfc2dcc
-
SHA512
cdf62a7f7bb7a6d511555c492932e9bcf18183c64d4107cd836de1741f41ac304bd6ed553fd868b442eaf5da33198e4900e670cd5ae180d534d2bd56b42d6664
-
SSDEEP
6144:e2Gk6wDaKov/5qrawOZI8uN0f/UVvN3MwdZFmiVFC+OEu:e2GkNo35qrawqmG/yM8PmiO+Ol
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
All Files/Assets/Backup/cgame.dll
-
Size
1.2MB
-
MD5
9a7234078559093e06c9d32148ed95a3
-
SHA1
40361dad15b9b5ae2757a21d1ce6a61c3c37e891
-
SHA256
32f5d0a454c26e8aa6f4cad58f3782337cc97cfe2305bbfe564437e5f0d51bbc
-
SHA512
9a2c3761d799999a691cd605f11c4014f604afa9a46b3b4c9999eef177f0e703ca2ed52c22824cba613559ce37bd134c566d54a4e51141828816b02a4f3da05b
-
SSDEEP
24576:4pPfSOTjS+katpqQTutqG3kGP7NS0LdbiAJ:4VnTu+kNQqqG3kIE0Ldb3J
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/fullware.dll
-
Size
262KB
-
MD5
51f7f7019658c2d03321795aaee76794
-
SHA1
d72856af1cd0f95951c3b7fd335caf620eda5796
-
SHA256
e2c7640c1c3e6f47a42e31770db248bbe8f44974d34441fc36e8651bddabab3d
-
SHA512
26e5934820cd7df1dfe0ed2ae7a1002e60312855da1654459a7b7037a8e8de037934c360d05c1af2ac53e655c7fd1be45dc52adb486ce73a8907486b76d0457f
-
SSDEEP
6144:vHUK1CqqiVpwTmWgsrSTEglq//sqoFo2V:vHyqqiVygs//ZoFo8
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Backup/izanptp
-
Size
432KB
-
MD5
9e82e3b658393bed3f7e4f090df1fbe7
-
SHA1
bfff954b8ef192c01af9fb5d9141a21279cb9c31
-
SHA256
c2ad5bd189df04b39be18dec5cd251cf79b066010706ad26d99df7e49fd07762
-
SHA512
de6a1e62d4e33f807d9c04f355a762717eedbcf540e747a97ba824871d4a1f144f4929141df333711d42af01e441dbbcecbb25a6a4f8ec073a024d94197b776b
-
SSDEEP
6144:9S4bS5XFvti0A0YqsAtMZDeJmdzh8KL5g3AepeV2fbRahYzUM3:9SMCXFFe0YqsAtEeJKCqN2jRahYp
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/017.phpt
-
Size
964B
-
MD5
7b23a20dcadfd60ad310603ef8c62b6d
-
SHA1
5239aba15cdc55e58acd10a608e39b028cfa3329
-
SHA256
ed1b311a704d6e1a3ba53d49db3c4c9b8d23115294e88b1cb2d30364ff026b51
-
SHA512
4ada19207cba9036d9bd7bc06a2ceb2d5255008d79f8e19b7479db0e6a6fb40f62464a5730c4594fb19b7d7ddc2c64666d4fb3b1cb6d50b3d17e40aacf2205e9
-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/EppManifest.dll
-
Size
716KB
-
MD5
102fde2cac521b547a2163ad9bffd51a
-
SHA1
4e8d237a9adf3bf03eb998115f611cdf72e582a4
-
SHA256
03a80832952d78ad4a5e223ec02bdbf0ab7e1e3c500c5ee7858f788b0dee3600
-
SHA512
c1774ef2f133a1e131e6014638145bd7c3c0e2103be992f7a06efbc04953b05f0d7214077563cf6a0a861b2c7df08e34680922e7768491ed126439e734f6c428
-
SSDEEP
3072:6SQgQUH6HNaTx9F7qIIuwSJ5FSpw2phB6Wh:LaP
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Assets/Data/NuGet.Packaging.dll
-
Size
761KB
-
MD5
5e214013105c0c00cbb0f45cdb2a2225
-
SHA1
47b11e473b42bb9686131b1bd442fa25cb1fdf1d
-
SHA256
be204225cd8e04a394bd8782c19f0639a935a7d62ab8a733890b27aed8660c6f
-
SHA512
8ffdaad8e11da69a426681201c36be92bd46588c4f2e1aacf93fc800b2df52a609204a139c56dee882cc02a2acef9f368ed3692d4825d27bc86dc2f07a3ecc99
-
SSDEEP
12288:6nnrttOdFXg8Ll++SW0FYG53NRBMPzvv7XF:+nrGdjLl30SgKPzLXF
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Assets/Data/StartupHelper
-
Size
364KB
-
MD5
14934caca84d5fe0288f27efb31dcbf8
-
SHA1
98c8c659488a5782679112e0ffb089422a664ac5
-
SHA256
7fa86147035627bae39576bcbe619d045e94a48c4db8ca131968c20bb4de4a36
-
SHA512
9a239132a46fe578fa04ff727d8c28f9e1d179e7154619670a22a403819f337af0a96ebd7081d04d53910a12bbdc548b3cd2b2a285931c92f1c149ad5d846a6a
-
SSDEEP
3072:rbT9vTZFNSlIbVf7o3Cyi7igb/Js0S6uZZspiDbZHNjWOnNxFiKey1ISQlXflY:fRvNvvbhOq7F3S/qpiDlNCONvmXdY
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/TMRegEx64.dll
-
Size
803KB
-
MD5
75e94d3ca12a7b80d5779302bad90495
-
SHA1
3e85b6a3e84d455b6d5f6e3566f6309876d343ed
-
SHA256
eab6419cd005e8a1ed4757cbb8d787036e61fa43e6555cb2689f3716054c1c04
-
SHA512
3dada2a921c513642ef328d36854cda25533b67f68c33adeed75206b71e55ac2c002d29381b976374cc5683676abccb9b0049c664225dbdc512e6be75c357eb0
-
SSDEEP
12288:6Wnt7tAjsdZNZlEXgof7J9S1rAsiAoSxQmJfXTOTxB91yj6L7P:6WltrZVEwgyAsiOJe263
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Assets/Data/bug18556.phpt
-
Size
752B
-
MD5
a4032889bb59f7c23df4fba26ff07409
-
SHA1
2f8fc843e3feaa5c3eccde4003d64ed06243c927
-
SHA256
dd7a625eab0105e7ce5cd2d7913790c132cb618f7b6b3084d412e7d5ce3d280d
-
SHA512
8adbae88f76cf424d30857e5b0c5509a62f553872356b8cd5391c10173a89d0882dcd8b2a8ade2b2b5422fc917cccd8c3bea951f9a00e6acf01b60b6f4b9fa9c
-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/insights.dll
-
Size
56KB
-
MD5
05e61539b8917fca37c03756bbdd043d
-
SHA1
5a72e0e528260de0ea5b34badb9e5f9873cb4245
-
SHA256
515c8e0b93f0fef15da3e2573ad92b7e7840374140e65e5d73df63d8e22cb3e8
-
SHA512
565d57783e6044d6e7e2026c79dbd897e637c5e1d96e7930dc704ef2b6d801669b38f0c26382f00e67e26668439274941e937a0ade54666de50b5d84f6da7e97
-
SSDEEP
768:YEGJ9blT7XZBSbHwJU+tGR0KZUyGKZ0ZgwmF1+3UVambg:YEGJ9bln5o0KZjGKZ0Z1mF1+3UVayg
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/installed.dll
-
Size
258KB
-
MD5
0ac98a4bfc717523e344010a42c2f4ba
-
SHA1
7967769ee63b28fc8bec14854a4a0a71bda6b3f2
-
SHA256
68546336232aa2be277711afa7c1f08ecd5fcc92cc182f90459f0c61fb39507f
-
SHA512
8a5f4f19c24c24a43d9d18a8935613ad6a031b8f33d582767a2407665f1ff39a403ddaeecbf4f22a58759fcd53f81f4392192ca9fa784ff098a6c995509f9547
-
SSDEEP
768:KNGdfE7k4pzco2V0lyurfRZBGb052Vqa9/QkHq6KT8W8LI1LWFznKM+psOKrjG5v:KNubVGu57nUQG0HZSBTjZGmDbKzu7Axc
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/izanptp
-
Size
432KB
-
MD5
9e82e3b658393bed3f7e4f090df1fbe7
-
SHA1
bfff954b8ef192c01af9fb5d9141a21279cb9c31
-
SHA256
c2ad5bd189df04b39be18dec5cd251cf79b066010706ad26d99df7e49fd07762
-
SHA512
de6a1e62d4e33f807d9c04f355a762717eedbcf540e747a97ba824871d4a1f144f4929141df333711d42af01e441dbbcecbb25a6a4f8ec073a024d94197b776b
-
SSDEEP
6144:9S4bS5XFvti0A0YqsAtMZDeJmdzh8KL5g3AepeV2fbRahYzUM3:9SMCXFFe0YqsAtEeJKCqN2jRahYp
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/lowSshC32.dll
-
Size
5.7MB
-
MD5
c4c176f948aaefdbac2007be7540f807
-
SHA1
fab53fea6bf9b66edf37c05f96d0113e7b3ff151
-
SHA256
b7ce745085da1ea321ba210178f90c7fbda7419a64452a887219b6fdc7ef762c
-
SHA512
f0883c2f65189a9992af98fc05947df34a43740d4c22196a2d3922edfe7e4fb2bcd75226a24b9482d2be5961eeb63a015a329a3a524f25d7e8c6acba31ab80bf
-
SSDEEP
49152:XMZDDtZO0oV8BPKzv694e7rnSmRw6DKnByzYC3rkOmcdbzKgZI9cji115OVcrDom:cno0w8BPW694evnSmG6oY013S26vCL4M
Score6/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/mc_enc_mpa.dll
-
Size
262KB
-
MD5
51f7f7019658c2d03321795aaee76794
-
SHA1
d72856af1cd0f95951c3b7fd335caf620eda5796
-
SHA256
e2c7640c1c3e6f47a42e31770db248bbe8f44974d34441fc36e8651bddabab3d
-
SHA512
26e5934820cd7df1dfe0ed2ae7a1002e60312855da1654459a7b7037a8e8de037934c360d05c1af2ac53e655c7fd1be45dc52adb486ce73a8907486b76d0457f
-
SSDEEP
6144:vHUK1CqqiVpwTmWgsrSTEglq//sqoFo2V:vHyqqiVygs//ZoFo8
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/msm.dll
-
Size
191KB
-
MD5
3109afa3173ddc16f9b08043e1db0ab9
-
SHA1
6076352e45786e341c5598e1bceb82bc98c7ea9f
-
SHA256
59ba38d1dfb82affc6ab8c797c9d75c18ca03fd6cee76a8ed542dbbfeef70060
-
SHA512
cfd59fef4344091179e772128105548e1ef0e67084105d4fe492eeb16b090f9a80cf18cfce626be125e3b00104079d21739451a8b97bade37d2f24af81bf766f
-
SSDEEP
3072:ssbUYqDN0gLkmbAOYnvK/PPKBUyyX2iEXS/upatC2GVs6er:UYuSmbALvKnP6iT/3/n
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/Data/portable.phpt
-
Size
752B
-
MD5
a4032889bb59f7c23df4fba26ff07409
-
SHA1
2f8fc843e3feaa5c3eccde4003d64ed06243c927
-
SHA256
dd7a625eab0105e7ce5cd2d7913790c132cb618f7b6b3084d412e7d5ce3d280d
-
SHA512
8adbae88f76cf424d30857e5b0c5509a62f553872356b8cd5391c10173a89d0882dcd8b2a8ade2b2b5422fc917cccd8c3bea951f9a00e6acf01b60b6f4b9fa9c
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Assets/Data/test_vendor.txt
-
Size
1000B
-
MD5
80aec646e662ecdb8f7677b93f39aab7
-
SHA1
5fd0591618895472bbfa350c9ea59356c93d8346
-
SHA256
5912f1ba252bac927720d0342e63b16a7e273b63e097bb3d1c8e68f9b0703742
-
SHA512
19e5d35c78cdfb64ca5caaeda5cd3b46dec21aa77c85d421959fa771614e5265602277c85b7557e58cae04d166feab5a9c5cb6c70c512a29852eb7b1a68fa078
-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/MigrationService/legal/bin/odt2txt.exe
-
Size
60KB
-
MD5
7740873b69ed9fbd043883f35625215e
-
SHA1
4f3dc44479feaef804c6d16af6feaeb98f2deaee
-
SHA256
87ccefd04081c88273f289e38052b172e3607803178593f57547adfcb9a41685
-
SHA512
5006fbc8fb283ccd2e181172bb675666e870bd861bbb0db6d7b1b0462331154ec9d24ac7b1c5ce748229d95028dfc5cea216c61297cce0da9d453b500bc00ea6
-
SSDEEP
1536:lqtO7wRXB6ktv9bHGKhxqHcrFT8on9rnfAWrF3A:lcjtJHGKqton9rflrF3A
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/MigrationService/legal/bin/sexp-conv.exe
-
Size
62KB
-
MD5
28dfa4942f159d4078c8d59abfbb0d15
-
SHA1
1189807666fb4cbb131a54c4e73a16d536a84041
-
SHA256
49a56387ba47d53025b2e78cd957fc465e5a8fddfc771d776f87ec2ca455764c
-
SHA512
2703edd205d55d6ffcfed968d6e2f3fc91e111d626443180f295d139b3d3d82402ecb4973e23bc37c0f78078ab47d9bb5cbf133fe8030088e19fae87c64fe0ff
-
SSDEEP
1536:MPFyB6stCaVPd6k2IAN7BGdpFuzTFrhh3+y0d0GcWDFF:MPFS6snj2xNGdKFuy0dnZDFF
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/MigrationService/legal/bin/wish.exe
-
Size
65KB
-
MD5
04e5e2f8ad46008a4691874bfc4a7a5d
-
SHA1
94a08eee1b13612cc11b77ebf44ece901362df31
-
SHA256
fc199ee77bc8ab131cf21ba332fafcc8a7132e7006d69a6e4195d48962c87fa0
-
SHA512
5b5521a6f256d812f3c8d3c0a8d03210da6c490c5a1ed53743a02cc422b6c1fc1136698f5e41ba6aaee6b92a5d6e4a5b2306cd77e0b8a2e4f7ecbde72c5f0944
-
SSDEEP
768:Mdxh9v8kTSnTUT0KV/+wawI+JbQiO8kApYLwjjCHd:uL8kWnTUTr25kJQixgwjjC9
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/MigrationService/libsmi-2.dll
-
Size
714KB
-
MD5
7ddc1f47c81f90f211ea6bb5a778d8fb
-
SHA1
a299a1bd0deddbe75b463e9c2802021934a37dbe
-
SHA256
aac65a1beea9932cc8d5976739139b37cbfb9164d1ad93012c63e34a1c628376
-
SHA512
f117981e67d17d2553ee33e0ec5099e03b55e3e8b87c751318abc44c56a18cdee6e6a80e1e6b70404c49dbf2601a916df8479cd393ae3bd2087182556b9a041d
-
SSDEEP
6144:9OlMYF8vb4v/3fQWgq4sQOp+gn+Ult2PmHqGGGGGGGGGGGGGGGGGGGGGptGGGGGe:IFlgq4sQY+UvHErB6RaDj1Rm+sj
Score8/10-
Downloads MZ/PE file
-
-
-
Target
All Files/Assets/MigrationService/msm.dll
-
Size
191KB
-
MD5
3109afa3173ddc16f9b08043e1db0ab9
-
SHA1
6076352e45786e341c5598e1bceb82bc98c7ea9f
-
SHA256
59ba38d1dfb82affc6ab8c797c9d75c18ca03fd6cee76a8ed542dbbfeef70060
-
SHA512
cfd59fef4344091179e772128105548e1ef0e67084105d4fe492eeb16b090f9a80cf18cfce626be125e3b00104079d21739451a8b97bade37d2f24af81bf766f
-
SSDEEP
3072:ssbUYqDN0gLkmbAOYnvK/PPKBUyyX2iEXS/upatC2GVs6er:UYuSmbALvKnP6iT/3/n
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
-
-
Target
All Files/Plugins/cache/Language/madHcNet32.dll
-
Size
921KB
-
MD5
d22b9da713ab36102c9c3d812af8c12d
-
SHA1
371fdbf6ae6a9a2e5c0560fc94eba3290028a252
-
SHA256
95b538b47e02d0ad2bd15d47efc18695d5e379ef61568b81ef405773d9c199bb
-
SHA512
e5ae51f79403358af60bb3ea663251badac57414813f5537d763b0b95504a393fb2d34c94c4b7328ec13f58e74a7147d3a72e63e62973c4c5d80671be1c8face
-
SSDEEP
24576:TlUbWq3/gquYUJ4Vgv0eUnDaE0efxfXT95:pUR4quYUJ4VgceXE0gxfjv
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
-
-
Target
All Files/Plugins/lang-1058.dll
-
Size
262KB
-
MD5
41c75e831a5571c3f72287794391a0e6
-
SHA1
0fe7a9a3c905d0376001a5c46edfc0000fa82bd4
-
SHA256
b3ad99afdaee3b9365e7a3ffcc44c2761e22a4f92dff5e5efdc52f6b08ea0105
-
SHA512
d3d03f3308db1862522127300127839aa44828d29622db20aea71e6a80a51247654e380d7a0126361d85774137826fc345ae368335bb1ea9c1c8995721daf432
-
SSDEEP
1536:yNbT+wDopP25xej01K1+KnohMEDdQPfYBRL37KCxr:gbiwo25xwKhTDd80Rp
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Drops file in System32 directory
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1