Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
103c7b097b31...0f.exe
windows7-x64
83c7b097b31...0f.exe
windows10-2004-x64
83c8a6c6cde...86.exe
windows7-x64
103c8a6c6cde...86.exe
windows10-2004-x64
103ca3e4676b...f1.exe
windows7-x64
103ca3e4676b...f1.exe
windows10-2004-x64
103cb47c4bbe...c1.exe
windows7-x64
103cb47c4bbe...c1.exe
windows10-2004-x64
103d18edb3bf...ff.exe
windows7-x64
13d18edb3bf...ff.exe
windows10-2004-x64
3d1ee6caf0...b4.exe
windows7-x64
103d1ee6caf0...b4.exe
windows10-2004-x64
103d2f05086d...0c.exe
windows7-x64
103d2f05086d...0c.exe
windows10-2004-x64
103d81f411b0...ba.exe
windows7-x64
103d81f411b0...ba.exe
windows10-2004-x64
103d90976d58...8c.exe
windows7-x64
103d90976d58...8c.exe
windows10-2004-x64
103d97ea72c5...9e.exe
windows7-x64
103d97ea72c5...9e.exe
windows10-2004-x64
103dd452b939...18.exe
windows7-x64
33dd452b939...18.exe
windows10-2004-x64
33dfc71cfc4...bd.exe
windows7-x64
103dfc71cfc4...bd.exe
windows10-2004-x64
103e435c9ff2...57.exe
windows7-x64
103e435c9ff2...57.exe
windows10-2004-x64
103e624f48a8...2b.exe
windows7-x64
13e624f48a8...2b.exe
windows10-2004-x64
43e8acfab95...cc.exe
windows7-x64
103e8acfab95...cc.exe
windows10-2004-x64
103e9a136b97...9d.exe
windows7-x64
103e9a136b97...9d.exe
windows10-2004-x64
10General
-
Target
archive_15.zip
-
Size
34.6MB
-
Sample
250322-g6sj3azsbw
-
MD5
7f3944a349f295202d784cd388eef05a
-
SHA1
427e7d29593be751c6c10f81f3e58b816fe79677
-
SHA256
7e71c79883eb025596762b4e0bf86b447039079dfe510ccf13a383b612575fa6
-
SHA512
d80befe7df86a473a098b9b00ef3d26b6a7d7407c194cf9d471a8da1e7a20ecbb86b759266e17f6c1a8f353f9b2d652f5e6032ef5ee5c9d9289f0c0ee1cbd599
-
SSDEEP
786432:2Paqcyrhk54qpiDw6up//yxNeiHZUKLZ9FlRVsE:24cEwE9aFHZUKxlLsE
Behavioral task
behavioral1
Sample
3c7b097b31ed5df2ce6313dddd86da0f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c7b097b31ed5df2ce6313dddd86da0f.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral5
Sample
3ca3e4676bac76c4f7eaf0ab169b8af1.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3ca3e4676bac76c4f7eaf0ab169b8af1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral7
Sample
3cb47c4bbe6856c45fd89eb5eb2723c1.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3cb47c4bbe6856c45fd89eb5eb2723c1.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral9
Sample
3d18edb3bf6b0493a6572edd73f937ff.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
3d18edb3bf6b0493a6572edd73f937ff.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral11
Sample
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral13
Sample
3d2f05086d9da9564c7c7e945875e80c.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
3d2f05086d9da9564c7c7e945875e80c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral15
Sample
3d81f411b0ec1ac7d861358e145db4ba.exe
Resource
win7-20250207-en
Behavioral task
behavioral16
Sample
3d81f411b0ec1ac7d861358e145db4ba.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral17
Sample
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral19
Sample
3d97ea72c561c7d15574a99be582c59e.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
3d97ea72c561c7d15574a99be582c59e.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral21
Sample
3dd452b9394976fd7b431d3dbae57d18.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
3dd452b9394976fd7b431d3dbae57d18.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral23
Sample
3dfc71cfc45034d671ac0f319bc080bd.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
3dfc71cfc45034d671ac0f319bc080bd.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral25
Sample
3e435c9ff25f6dca4a3e7262825aa557.exe
Resource
win7-20250207-en
Behavioral task
behavioral26
Sample
3e435c9ff25f6dca4a3e7262825aa557.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral27
Sample
3e624f48a849ad8a70e09f6d4e75f02b.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
3e624f48a849ad8a70e09f6d4e75f02b.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral29
Sample
3e8acfab95493518077e0028fd0f2dcc.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
3e8acfab95493518077e0028fd0f2dcc.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral31
Sample
3e9a136b97b7ad7104019ae696b4f59d.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
3e9a136b97b7ad7104019ae696b4f59d.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
njrat
im523
HacKed
score-fears.gl.at.ply.gg:6905
47ed2009f1c922f581a240792169875b
-
reg_key
47ed2009f1c922f581a240792169875b
-
splitter
|'|'|
Extracted
njrat
Njrat 0.7 Golden By Hassan Amiri
HacKed
if-contest.gl.at.ply.gg:5461
Windows Update
-
reg_key
Windows Update
-
splitter
|Hassan|
Extracted
xworm
127.0.0.1:4758
108.77.173.66:4758
127.0.0.1:5470
red-ps.gl.at.ply.gg:5470
-
Install_directory
%AppData%
-
install_file
XClient.exe
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
xE8mXg8CRXTe
-
delay
3
-
install
true
-
install_file
Bigger.exe
-
install_folder
%AppData%
Extracted
njrat
<- NjRAT 0.7d Horror Edition ->
Victim
46.197.220.52:1604
7bcbf5e23295248042b5dac9a154ecb7
-
reg_key
7bcbf5e23295248042b5dac9a154ecb7
-
splitter
Y262SUCZ4UJJ
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
FEB 27 LOGS
dwjsrlleihmlidl
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/i3NzmwEg
Extracted
njrat
0.7d
HacKed
127.0.0.1:5552
b13e292b915775ba092e61499e08a32d
-
reg_key
b13e292b915775ba092e61499e08a32d
-
splitter
|'|'|
Extracted
njrat
0.7d
Lammer
8f04f9cf1cb0a66772ec936fb174701b
-
reg_key
8f04f9cf1cb0a66772ec936fb174701b
-
splitter
|'|'|
Extracted
nanocore
1.2.2.0
4af74541-e3f1-469c-8af7-efe4071b81cf
-
activate_away_mode
false
-
backup_connection_host
178.32.224.116
- backup_dns_server
-
buffer_size
65535
-
build_time
2018-07-28T12:59:38.488799236Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
false
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
46218
-
default_group
tourex
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
4af74541-e3f1-469c-8af7-efe4071b81cf
-
mutex_timeout
5000
-
prevent_system_sleep
false
- primary_connection_host
- primary_dns_server
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
asyncrat
0.4.9G
corporation.warzonedns.com:9341
480-28105c055659
-
delay
0
-
install
false
-
install_folder
%AppData%
Extracted
njrat
0.7d
neuf
doddyfire.linkpc.net:10000
e1a87040f2026369a233f9ae76301b7b
-
reg_key
e1a87040f2026369a233f9ae76301b7b
-
splitter
|'|'|
Targets
-
-
Target
3c7b097b31ed5df2ce6313dddd86da0f.exe
-
Size
37KB
-
MD5
3c7b097b31ed5df2ce6313dddd86da0f
-
SHA1
56831f20af7c89fb3c5e3cefa70e5e6b2a98131e
-
SHA256
de21a0b40b5f1cff271d2fe33518fac7c34382670bb0dc412363fc15f88e5ea7
-
SHA512
83a1fa6e3929ec00eab0a347dff6671f57229423067301f317d6edfde58b66624b6dc673d51fbfb8b84168dd4a11e5e1ebc99cd08f0155214404078fce6ab0f4
-
SSDEEP
384:mLuf7WpgibTjpPu7w9qyMTczHPes2A7rbrAF+rMRTyN/0L+EcoinblneHQM3epzk:PqNN9ZMTczWtAbrM+rMRa8NujGt
-
Modifies Windows Firewall
-
-
-
Target
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086.exe
-
Size
2.0MB
-
MD5
a25affdb70bad26a0357487086c6f275
-
SHA1
a8381e4cbb1b3291c4331f788d000bf95b95edf8
-
SHA256
3c8a6c6cde2240783bed48a2f3d849a30bfa841d7cb55177721631dcec1eb086
-
SHA512
2da6932d438fd9fcca1346ea33720aaeb75007e49b4956834563dd18390291eb2c5f541e37f61ae05bdfc90646c476ea7c18ec7b8b5380d29ca3b634c617bc43
-
SSDEEP
49152:7rYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN:7dxVJC9UqRzsu+8N
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
-
-
Target
3ca3e4676bac76c4f7eaf0ab169b8af1.exe
-
Size
78KB
-
MD5
3ca3e4676bac76c4f7eaf0ab169b8af1
-
SHA1
3873da68bc51d374243468d08e73058674ea0a02
-
SHA256
572c49454d971b5cebc708b888e42970a4f954d97cdd8cd237a5ce4b281c60a7
-
SHA512
2f34a5d1affdada1686408f5f6ac748fd688215a2a12acf897f06af177ad103dbae344102b271b572a5e51ec11b68d97b7d2fa184244ce67d5ea8430f85f1e4e
-
SSDEEP
1536:bCHF3638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtN9/t1+S:bCHFq3Ln7N041QqhgN9/Z
-
MetamorpherRAT
Metamorpherrat is a hacking tool that has been around for a while since 2013.
-
Metamorpherrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Adds Run key to start application
-
-
-
Target
3cb47c4bbe6856c45fd89eb5eb2723c1.exe
-
Size
114KB
-
MD5
3cb47c4bbe6856c45fd89eb5eb2723c1
-
SHA1
61ec438d8c8e4c382353587bb7eaf2aff7581f1f
-
SHA256
b023de4ecd98db961a3aa5c6aa9f6d79560c5dd72aaa2ea61e907dfac2503bb2
-
SHA512
53b273a1d5355b40664b5d9a5af40bec0315352d511a45d57d8a10693c5f7e7be8972d614eb4e9504bbf4fa455f51c149d891f0a5c29c1a82955d0b678f4a479
-
SSDEEP
1536:WWp5eznKUlIOp3YjVCguHEvQEbFqVC3woFRKpT4XEQhuxzuMDI1:P5eznsjsguGDFqGZ2rDI1
-
Njrat family
-
Modifies Windows Firewall
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
-
-
Target
3d18edb3bf6b0493a6572edd73f937ff.exe
-
Size
16.4MB
-
MD5
3d18edb3bf6b0493a6572edd73f937ff
-
SHA1
5845f04892c5c4314dab1b885c4ee77e5f799052
-
SHA256
eec5563cab061ef1b00530425de7891a09ec8416aae780c6c651c7caf98d7879
-
SHA512
81eb59c2170c17959c6814847b420ff7682145d552692c6af1d88fc1b251d4bfd5ae45a9f7f017184812c69606bd132309f879f8031da5a1b23a309d52185a4b
-
SSDEEP
196608:S46M6QqOyjr2LF3Ye6YmnwqdU142U8ZG7xKmHH:51cjSLFoBYmn5U1PtZG7xK6
Score1/10 -
-
-
Target
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4.exe
-
Size
218.5MB
-
MD5
d86b4e05d449d68ae457d3bf780eb2ab
-
SHA1
eb7e026cb99fa53ed05e7814497910b67140cda0
-
SHA256
3d1ee6caf0803c689aa17a8bada108bd515a77493a9d76dca7d55762bb6d33b4
-
SHA512
b3d9f94429cfeabd616a4624589a1da05d5e3b33244b92d49bdc0345a50cbea524b37d2305c93e4c381cf8f03214b3844f4cc2a56d7f7ea68fb3a1f21fcb1318
-
SSDEEP
6144:tvcXK+rhXT2Ef5YTe6VlWT8b9qHVKIGJG3qVbgVSLh:VsFyEf5KPVle8oY1GT
Score10/10-
Modifies WinLogon for persistence
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
3d2f05086d9da9564c7c7e945875e80c.exe
-
Size
43KB
-
MD5
3d2f05086d9da9564c7c7e945875e80c
-
SHA1
2a691bccd730f0d1b20743f97ccde01ce625dee1
-
SHA256
f7faff3064d94d1977899b814099e4276349b80c7896c26142080d540e54a7dc
-
SHA512
05a876ed8e07d1750a4be4bd20904745fb96203e6bb05c9f861e91bb84ccc97cff0a463dd26e8bb8b5ba2128a98e82ee89433bcfed646b07f79d885c843e4ebf
-
SSDEEP
384:vZyrUJ1Cj8syWcWrf7E5GiXeEXME5EAftz8Iij+ZsNO3PlpJKkkjh/TzF7pWnU/N:ReUJ04pWcWr7E5ZVMEzXuXQ/o13+L
Score10/10-
Njrat family
-
Drops startup file
-
Adds Run key to start application
-
-
-
Target
3d81f411b0ec1ac7d861358e145db4ba.exe
-
Size
999KB
-
MD5
3d81f411b0ec1ac7d861358e145db4ba
-
SHA1
4b945e693bc455840912fc5b5f155c36501d235e
-
SHA256
72b49e4d9aa54af40111e35d0d4bcb4a7a313c4f2f5c5f33c3b7a093b7f4fc0e
-
SHA512
216c654e895ec5065b7d724f5421184e2a3445f4b801f0ebcc3ce34676e2d89240f22af079fd7a7d074af3567ee483ebe2f6b40bfea224956ff00f5d326894fe
-
SSDEEP
12288:H9pLLk45WSSY1BX6f4bIS7rMNetPfC9Vs6IFGs0jxAqXj9xPSI0dzNgCoD7WX+Iu:H9pP5WS3lrMNyC9TJPCXBi
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Modifies WinLogon for persistence
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c.exe
-
Size
587KB
-
MD5
58388ff123bd5e52aa3e7fa34cfa8a7f
-
SHA1
6b43aa7430ad9e446acf2f8d04ecb8f6b6eaa4c5
-
SHA256
3d90976d58eb1346f68434f0575cec2ed017a5959384e7137600668ad7777d8c
-
SHA512
a4b5405d5e0c4f555e151c207c2d6d38e52b3dc3c59f3629729cec2578dc0426621b8f321ce770e69270e974e1d96f6eacc6d38d2f9b89c6aed4ed4ce397a991
-
SSDEEP
12288:tZFFZDJe6R3dvAheWxnMbbY1wLBuYEAmDUDAc5c:tZnR3ROWblBuYVD
-
Njrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of SetThreadContext
-
-
-
Target
3d97ea72c561c7d15574a99be582c59e.exe
-
Size
67KB
-
MD5
3d97ea72c561c7d15574a99be582c59e
-
SHA1
25eab8088c710e7f44b9d569eb96a27762cd53ca
-
SHA256
06de1b5a3ba2dae2ed909d8e647cc5c1a141b7520d26cda3f54947e7f8aaad45
-
SHA512
b0f1f99ac3927518e80ac6a5643949ac0945ab25faf7d4c8ea29dd9b3051f16fe3e3dea26a0006561b9836a50850cd2b41ad7c0341f6dcc823b73e9df02b1e69
-
SSDEEP
1536:I+mxV1I5K7uB6MnjU9bkVPWMXil+bV1Ts4um0h62lNn86OW6ds:I+DK7ukHYVPWM4+bVhp0lnjOWos
Score10/10-
Detect Xworm Payload
-
Xworm family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
-
-
Target
3dd452b9394976fd7b431d3dbae57d18.exe
-
Size
4KB
-
MD5
3dd452b9394976fd7b431d3dbae57d18
-
SHA1
98940f9f7f1ebe646176130530941a92cbd14b94
-
SHA256
24ea75eec3b7573f491e69fe6f3e999dd7a58c16462ceb94b212d3235ed34bff
-
SHA512
f48f8d49263f32c6026b026688b3c969c1b202082f3c4ba93e6d701d0f12f94d173b77afaa3a5b996dc0fc1988c11734e30206560391b90fb28912f7d2301524
-
SSDEEP
48:6gmrtWxZ8RxeOAgFJCcV4MKe2YYo2dEwPvqBHnuulp+hvqXSfbNtm:UpxvpVx9Q3vkZLkhzNt
Score3/10 -
-
-
Target
3dfc71cfc45034d671ac0f319bc080bd.exe
-
Size
885KB
-
MD5
3dfc71cfc45034d671ac0f319bc080bd
-
SHA1
7d8a8faccf06d8ec762bdf56e8842dd069ec3801
-
SHA256
13af700b0453342984055a1e70619698a9163812e7524e4c6c264e29f25fd9a1
-
SHA512
8c824df6e8976dbf362cc075a1f114d9b86ad16cc0bedd880ef0a6afb7e745b901d957b96b8cf40020cbfb1c52f82874eacd319a9dc905b64d793c953503a00e
-
SSDEEP
12288:8lNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:8lNCv6XJ5BClaXfD9vUha+u
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
-
-
Target
3e435c9ff25f6dca4a3e7262825aa557.exe
-
Size
984KB
-
MD5
3e435c9ff25f6dca4a3e7262825aa557
-
SHA1
57cb6e337e1c91c2937544fdfa78d3704d2ff408
-
SHA256
db97ef403b3433d2cae1fc98d893d14e67b83a14e7d8e4e428152fde8d83d934
-
SHA512
00c0863dc6728e01cddb5c605d1210c0d1c2b7bf7b4e2426f61bb2b6eb4addb102c7ef5d46db693557b3e8dcf4d68a33ddcfe499713666afd05d986b5be9ebe8
-
SSDEEP
12288:LzZvuvewk/0pPPXA5q/TQ9+n95vV25gnwHexSDwbwvDxlpaS98IUNldnd65EgF1s:LzZvuGD2PvA5YxwmbZB6Uv
Score10/10-
DcRat
DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.
-
Dcrat family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
3e624f48a849ad8a70e09f6d4e75f02b.exe
-
Size
78KB
-
MD5
3e624f48a849ad8a70e09f6d4e75f02b
-
SHA1
bafda32b69d0f3f342d1d404b82825f4593215de
-
SHA256
fb792ce78c7eee26dfb39a9394a2993a3799b896f66ee903f4ebfd75580828a9
-
SHA512
f95f9f0879127ae691e41eb1bea3a84bbeb8453cec57a21394fc37a96f74149a14a588cdec7a8775d70628a8e7828dc94f84f68fa3ebb88909c0b86245c9ad8c
-
SSDEEP
1536:6Njum7Ynydw8KwHpF73i6EBXlLOUpGO7VHKgFtJjTD0K3gI4:6Njum0ydDKqX0LOUpjZbttTDiI
Score4/10 -
-
-
Target
3e8acfab95493518077e0028fd0f2dcc.exe
-
Size
418KB
-
MD5
3e8acfab95493518077e0028fd0f2dcc
-
SHA1
916709a0aab1d58c686999f2bdc894e63dc7699a
-
SHA256
0a5a53bdc5eee30ec63ba27249253d0ad2224bfc7bf3fc790642427a545d2b1f
-
SHA512
fde4cfa600e96f292996b779814e32ea4b98b45b7ac117f1aa2a98b4d09bdcbcb3cce6602bd8037cd184c12fbc937e73c7d3aeb088bae982e301ebe3bfa8be80
-
SSDEEP
6144:ITNE3ZRrnaBVlvphVxmP+6CiejgcME1cwYfU+va+RUwbvl:ITNYrnE3bm/CiejewY5vXN
-
Nanocore family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks whether UAC is enabled
-
Suspicious use of SetThreadContext
-
-
-
Target
3e9a136b97b7ad7104019ae696b4f59d.exe
-
Size
273KB
-
MD5
3e9a136b97b7ad7104019ae696b4f59d
-
SHA1
99fff6e4e8320f9908ee359a3ed05549ef4d03a9
-
SHA256
ab3e7a2f39d9f97249371e3e0710bc1878410d19d8709fe5d9db437df1904a11
-
SHA512
8fab1f6ae6d36ddd4e92443064ac2473e5cc6a5db9cbf28d6446ecbc1836860bbc0afe78f7b49db3bd8dedb5b4043da49c996156107d2c2433ec999c37527ea4
-
SSDEEP
3072:WdvzDqxs8ORikgogWfiuRXd3YmSffdTKXNXANewGBvskX1pWA/s8sdT6:WFzDqa86hV6uRRqX1evPlwAEdO
Score10/10-
Asyncrat family
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2AppInit DLLs
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3