General

  • Target

    ebc1a2cded55a610197dfb088b54745b0ee65e8959a61acaec2bf6acaecbdea2

  • Size

    11.0MB

  • MD5

    ddeedc77a0a1a2ea1563484d69d72fe4

  • SHA1

    d5dbf1627d4582746016e8caa80dece8569a08f2

  • SHA256

    ebc1a2cded55a610197dfb088b54745b0ee65e8959a61acaec2bf6acaecbdea2

  • SHA512

    dac7f71e3474d293f9e2817febfefce02d6aefdcec0c9fd1130f6a70114495bffe3baf2165f761da4c2413d4c53c3f211551e186018d33a4165a391d2ac1f68e

  • SSDEEP

    196608:Wqv7fQjtjSyqVhdWT3eUR03Fzjb0u3rK74yBngXp64Yjb2ERW6VxF:Kz

Malware Config

Signatures

  • Contains code to disable Windows Defender 1 IoCs

    A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.

  • Detected Mount Locker ransomware 1 IoCs
  • Detects Zeppelin payload 1 IoCs
  • HelloKitty ELF 1 IoCs
  • Hellokitty family
  • MassLogger log file 1 IoCs

    Detects a log file produced by MassLogger.

  • Masslogger family
  • Merlin family
  • Merlin payload 1 IoCs
  • Mountlocker family
  • NetFilter payload 1 IoCs
  • NetWire RAT payload 1 IoCs
  • Netfilter family
  • Netwire family
  • Remcos family
  • XMRig Miner payload 1 IoCs
  • Xmrig family
  • Zeppelin family

Files

  • ebc1a2cded55a610197dfb088b54745b0ee65e8959a61acaec2bf6acaecbdea2