General
-
Target
bomb.zip
-
Size
4KB
-
Sample
250222-tz19vavqz5
-
MD5
4d9bd8dafb8299d0fc3fc98f8b8c27d4
-
SHA1
f3b375208d793e65faabfd237c5391b49f381908
-
SHA256
94936fb4c7bed2e7233fade7980425b0300451d76a7ac9329c604886e2a9a013
-
SHA512
5e1efbbe50bdbdea6efe2314ac34eb6c185353318f1171b363062cd88d99f567fef66cacf8c05520dea664c1004e24f74f89db4979e7a17da8f74d022e164e65
-
SSDEEP
96:iNTZjYifQ0FS3KtpSSIvWClq6gXhiVIntbmfPWu+JtHmfinZxNpph3NPv:iNNjlQR3KtZtCqhiV0qOJjnZxNfh3t
Static task
static1
Behavioral task
behavioral1
Sample
bomb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bomb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
bomb.exe
Resource
win10ltsc2021-20250217-en
Malware Config
Extracted
redline
Feb2025
176.65.144.135:65012
Extracted
phorphiex
http://91.202.233.141
Extracted
C:\Users\Admin\AppData\Local\Temp\Decryptfiles.txt
Extracted
njrat
HacKed
53$79$73$74$65$6d$33$32
-
reg_key
53$79$73$74$65$6d$33$32
-
splitter
|-F-|
Targets
-
-
Target
bomb.exe
-
Size
12KB
-
MD5
a14e63d27e1ac1df185fa062103aa9aa
-
SHA1
2b64c35e4eff4a43ab6928979b6093b95f9fd714
-
SHA256
dda39f19837168845de33959de34bcfb7ee7f3a29ae55c9fa7f4cb12cb27f453
-
SHA512
10418efcce2970dcdbef1950464c4001753fccb436f4e8ba5f08f0d4d5c9b4a22a48f2803e59421b720393d84cfabd338497c0bc77cdd4548990930b9c350082
-
SSDEEP
192:brl2reIazGejA7HhdSbw/z1ULU87glpK/b26J4S1Xu85:b52r+xjALhMWULU870gJJ
-
Asyncrat family
-
Mimikatz family
-
Njrat family
-
Phorphiex family
-
Phorphiex payload
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Redline family
-
SectopRAT payload
-
Sectoprat family
-
StormKitty payload
-
Stormkitty family
-
Xmrig family
-
Async RAT payload
-
XMRig Miner payload
-
mimikatz is an open source tool to dump credentials on Windows
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Creates new service(s)
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Stops running service(s)
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Indicator Removal: Clear Persistence
Clear artifacts associated with previously established persistence like scheduletasks on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
2Disable or Modify System Firewall
1Indicator Removal
1Clear Persistence
1Modify Registry
1