Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    archive_16.zip

  • Size

    103.7MB

  • Sample

    250322-gw3x2syzdz

  • MD5

    e4cb0529c077b3500dc8f902b1923d80

  • SHA1

    e247b6dae0ab67341323aa97a66340d60d38d46e

  • SHA256

    777f77c1c53c3551c89ef44c86c06cbfe0b2bb04374b7d7d9f6153d3ecc3c267

  • SHA512

    b2f772f1a0e7d02af2431fe1334c4daf054975f99f4df6451c78ec2a85afef55f48897c21b64f85c7790ee35560bbc1fa7e997aa3fbb1e10607787438bdd8f71

  • SSDEEP

    1572864:oUxj1u0Pkk6tCfka6Sd+kojZix3iJUZ+dYMj9xqQUI0GBHNU0RVO7xqO4N4VB1Zo:Ls0SW6Sd+NZi0JU+d3iQb0at/ixycU

Malware Config

Extracted

Family

limerat

Attributes
  • aes_key

    BAMBOOZLEDLOL90

  • antivm

    true

  • c2_url

    https://pastebin.com/raw/e7ZVsDvz

  • delay

    3

  • download_payload

    false

  • install

    false

  • install_name

    Wservices.exe

  • main_folder

    Temp

  • pin_spread

    false

  • sub_folder

    \

  • usb_spread

    true

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

192.168.1.9:7070

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

Version

5.0

C2

127.0.0.1:59935

phone-officer.gl.at.ply.gg:59935

Mutex

6478UXipUt7TBybG

Attributes
  • install_file

    USB.exe

aes.plain

Extracted

Family

njrat

Version

Njrat 0.7 Golden By Hassan Amiri

Botnet

HacKed

C2

3bada.ddns.net:5552

Mutex

Windows

Attributes
  • reg_key

    Windows

  • splitter

    |Hassan|

Extracted

Family

xworm

C2

https://pastebin.com/raw/DfF7GpwD:123456789

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

  • pastebin_url

    https://pastebin.com/raw/DfF7GpwD

Extracted

Family

njrat

Version

0.7d

Botnet

HacKed

C2

mooonskj.ddns.net:1177

Mutex

90a0da4b1ca43b0ce0ac08e14902e3ff

Attributes
  • reg_key

    90a0da4b1ca43b0ce0ac08e14902e3ff

  • splitter

    |'|'|

Extracted

Family

limerat

Attributes
  • antivm

    false

  • c2_url

    https://pastebin.com/raw/e7ZVsDvz

  • download_payload

    false

  • install

    false

  • pin_spread

    false

  • usb_spread

    false

Extracted

Family

nanocore

Version

1.2.2.0

C2

91.236.116.142:5888

Mutex

d995ed82-bf13-4043-b564-f5f89f8c5209

Attributes
  • activate_away_mode

    true

  • backup_connection_host

    91.236.116.142

  • backup_dns_server

    8.8.4.4

  • buffer_size

    65535

  • build_time

    2017-01-07T03:01:54.729778636Z

  • bypass_user_account_control

    false

  • bypass_user_account_control_data

    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

  • clear_access_control

    true

  • clear_zone_identifier

    false

  • connect_delay

    4000

  • connection_port

    5888

  • default_group

    Spy

  • enable_debug_mode

    true

  • gc_threshold

    1.048576e+07

  • keep_alive_timeout

    30000

  • keyboard_logging

    false

  • lan_timeout

    2500

  • max_packet_size

    1.048576e+07

  • mutex

    d995ed82-bf13-4043-b564-f5f89f8c5209

  • mutex_timeout

    5000

  • prevent_system_sleep

    false

  • primary_connection_host

    91.236.116.142

  • primary_dns_server

    8.8.8.8

  • request_elevation

    true

  • restart_delay

    5000

  • run_delay

    0

  • run_on_startup

    true

  • set_critical_process

    true

  • timeout_interval

    5000

  • use_custom_dns_server

    false

  • version

    1.2.2.0

  • wan_timeout

    8000

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Boy12345#

Targets

    • Target

      410897f36809104096c8b600eb3a0444.exe

    • Size

      1.1MB

    • MD5

      410897f36809104096c8b600eb3a0444

    • SHA1

      18e8b8e65471f7f19b3612ba93a20bd6a702e7dc

    • SHA256

      1cf0ed57e906c3779244c8b9c1f5482db0f92e67c2055dce9fa90dc8fbef65ed

    • SHA512

      479e8b2a06d8861f8bb1ca9d5271149408853dcccb5c93a1e7a0d72e2a01af47131cd91d50e1edbd5bc2c0edcdfdf07f56c8f6c04fd3c12edc67389cd75664d0

    • SSDEEP

      12288:qmc4TfAkdN7TPPl2Eh8Nv6L1FMCubuoGTeh46qTnnCPQeB89hNuD1hOp1i3l10gR:qh4TbLUEhZL/GspeYhkc9Soh2SfwJ

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Modifies WinLogon for persistence

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Target

      41234e0118ba1cfc06b88d347f3a53f5.exe

    • Size

      885KB

    • MD5

      41234e0118ba1cfc06b88d347f3a53f5

    • SHA1

      a0bc5bbd988def1d53cb8b74d6a19084ebec1a92

    • SHA256

      7eaf3845dc36309ef1b4dbcf87058d55bbe2b9bdad969d53c9bf6f250981dd6f

    • SHA512

      25f929d3197123654edfd7ba2dcad5dcc0c2fab2743c9e7b80ed2b419326f5666799d6866ed76d51f7fce1a48e1d67c0454f5a9f699c04c590366c27c313d49c

    • SSDEEP

      12288:GlNE5VnZuh+ZIlXJBH5SP2I/lwvDT77/wOKsV42i3GULVaHeopyyx:GlNCv6XJ5BClaXfD9vUha+u

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Target

      412f4448e99979a1ce810cdf392b6abb.exe

    • Size

      597KB

    • MD5

      412f4448e99979a1ce810cdf392b6abb

    • SHA1

      1b8382397ac991d6c915bd00ff51594f88f4067b

    • SHA256

      6a5a315d1878a62da0fcf7679833cf9c9a171b46ffb2b769e92bf30046f26b14

    • SHA512

      0a6967c7cfa7be78773b469bbffbce9a3cf76b6c059fa31142e95acf09f3ab66409aa577df327044759257c7cd281d683131aaa85ca81f7ddf00e064332ec39d

    • SSDEEP

      6144:btT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3ri8:t6u7+487IFjvelQypyfy7i8

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

    • Target

      414a1d40006fffeb00666df68e3457f2db0ca7e9045535cc5de3c88c9e7fcc6f.exe

    • Size

      552KB

    • MD5

      242e593726fda21393dceef813665056

    • SHA1

      9fae5838ef0a3462353eb5f72f58c7fbb484ebb7

    • SHA256

      414a1d40006fffeb00666df68e3457f2db0ca7e9045535cc5de3c88c9e7fcc6f

    • SHA512

      bbcd9c3bf1d6f3df0d3c5908ede9dd93af131d34098b730085b08bf86ea5bba949469d8d2a623d0036e549d140fa2050552e02d8cfdf7c410c20c2b5258ba7e3

    • SSDEEP

      6144:uLzBDCmu5mmVPHVeSLe6VlWT8b9IQfnIFEQLk6dKAsbbs9kG:oxc/VnPVle8zCE8KAsCkG

    Score
    1/10
    • Target

      414cb3c4ac2d42889d7c55565afc0f57d2a0e9f7a186b5d5d8e5118fd3f976da.exe

    • Size

      2.0MB

    • MD5

      db87424723d41b8b4075c1e0cb33e01b

    • SHA1

      a88fe56ef8789d939da5fff58b871b2028b64eed

    • SHA256

      414cb3c4ac2d42889d7c55565afc0f57d2a0e9f7a186b5d5d8e5118fd3f976da

    • SHA512

      ed970d754b3472098cec36bd7f6ad26254e4e0ddced625b3f93963b5eb275b626a1e5eeb08a6b573b60aa15946fd275f3743ceb6a37c94b1bf888f38907d4db7

    • SSDEEP

      24576:7L81USHF/mAhAdMywT1KBgvJRtlpLklKuVy2NtD:w9Wdxk1KBClpP

    Score
    3/10
    • Target

      414f523f34e87006f31ca4b703886d3b.exe

    • Size

      28KB

    • MD5

      414f523f34e87006f31ca4b703886d3b

    • SHA1

      e27871b4cb2d7315fa3d2b698ac23ddb94e408a6

    • SHA256

      474b1b39afa99d3cc1f1932ba8e27580f74b8d2d7e7b6a97655deaa20d0a029d

    • SHA512

      05163bb4a3c03b00f207f6115cdbb64bc46d620bb05c35f5d111da9020fae8b72898e40e63c6225608073d9d7057ef168f1797c3b5156e4fb842723842705400

    • SSDEEP

      384:IE0WnRVi0Emqtpo0farhJqt0+JCZolDFLvDuNrCeJE3WN5hWUy14oAPwPnro3lc8:liJY0i1J3/ilJ7k5NbW54drtY

    Score
    10/10
    • LimeRAT

      Simple yet powerful RAT for Windows machines written in .NET.

    • Limerat family

    • Legitimate hosting services abused for malware hosting/C2

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Target

      415b778406bbdc705f1962ded94e90d0.exe

    • Size

      984KB

    • MD5

      415b778406bbdc705f1962ded94e90d0

    • SHA1

      978d2e0051ce04c78f60f312a9389d31ed346d82

    • SHA256

      77c664a6cd94c282ecfa0c4f8fa7b101dee5a74b424fbfee3290a9d0315a1bfe

    • SHA512

      d11ef00e5661474983be3d32afc695d9eeb5fbddefb99c05b5d84d6bb85cdafde98ff34d07a65c2b36adb0b6d93ce25111b2cea59ccc6dea65682580d5ddd3a9

    • SSDEEP

      12288:LzZvuvewk/0pPPXA5q/TQ9+n95vV25gnwHexSDwbwvDxlpaS98IUNldnd65EgF1s:LzZvuGD2PvA5YxwmbZB6Uv

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Adds Run key to start application

    • Drops file in System32 directory

    • Target

      4175909fcd35882461a1cfd784f7c967.exe

    • Size

      17.7MB

    • MD5

      4175909fcd35882461a1cfd784f7c967

    • SHA1

      97c039024a434f8605ca06df16ee7355fd380e0d

    • SHA256

      34a347012a452bb37b3da0cead9eaf007ec0e82a26b90ee1155ca8135bccd537

    • SHA512

      ccf29163313a378c4d908e1ac400afc6299e5a2046b206f0eed46ccd0779f9bcb2a0162bb86db64504c71cfeb76df056dca621a4e1f267e28258ce5c10721c57

    • SSDEEP

      393216:8YGbY6iHonlQCe88BYdY3SHFPJXFODKSblmnTCAc:87Y2CCe4dAmFOmSJme5

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Adds Run key to start application

    • Target

      417e4b08378988e057831e5c3a74fd18014fc5fe2402e8aa3746e020a467ce74.exe

    • Size

      2.0MB

    • MD5

      4b8d35a4a07f02739e201501d8dfd5e3

    • SHA1

      095c2562f09a21b02208117cdbeb95ba846d35fe

    • SHA256

      417e4b08378988e057831e5c3a74fd18014fc5fe2402e8aa3746e020a467ce74

    • SHA512

      b8b8cc646817aa95f3f581006588058563571ecb96c28fd2fe6dfecf9ca9126a9ae09df26092d72cad244d1867463d38ee66205d4efbca13b87fbe5c897975b3

    • SSDEEP

      49152:brYU+Yy4J8jao9UVlWAOjhRzsiYHjo++xTN8:bdxVJC9UqRzsu+8N

    Score
    10/10
    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Target

      4189a83a9b95038e6e32f05b4c69f3b4.exe

    • Size

      54KB

    • MD5

      4189a83a9b95038e6e32f05b4c69f3b4

    • SHA1

      516c5997c8102be91f6ed419e808864e0381de86

    • SHA256

      2f0fa7dd79cc0a033d55dc62043f188fdcefb4ce7aab2e1ee649d877c2321381

    • SHA512

      53c34bf3919d5cb549a403ae4e20f171e3a744e416ebbfa017413c02d3332b93e261249d5336e73abbd213af37f294b0790e49092913c6d3d556e7d9b4597ec2

    • SSDEEP

      1536:FOpwLVcvsG+yiZodvTlhJX3eye5IybOCoDGbfV:F4wLyvky6opTTt33MSN6rV

    • Modifies Windows Defender DisableAntiSpyware settings

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender notification settings

    • Modifies firewall policy service

    • Modifies security service

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Identifies Xen via ACPI registry values (likely anti-VM)

    • Disables Task Manager via registry modification

    • Disables use of System Restore points

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops startup file

    • Checks whether UAC is enabled

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Modifies Security services

      Modifies the startup behavior of a security service.

    • Target

      41c0c0017e07c3984ced9121a820b070.exe

    • Size

      45KB

    • MD5

      41c0c0017e07c3984ced9121a820b070

    • SHA1

      7b327566eb0d06339f8741f59575ac9e88b49b1d

    • SHA256

      89777f33cb0634f313f70c521458b7107575afaef6157e63eb6b5ca2862976a7

    • SHA512

      57cf65570c57285c6d51c3ca751639711fc0d3d5536746e0442af773f7b77409cec19c9c379a79f72b87395ea5ea7e77457dd59a839c0b058cd982b804a36e53

    • SSDEEP

      768:vuwCfTg46YbWUn8jjmo2qrDKjGKG6PIyzjbFgX3ilJkuXK+4aBDZSx:vuwCfTgp/2OKYDy3bCXSlJtK+PdSx

    • AsyncRat

      AsyncRAT is designed to remotely monitor and control other computers written in C#.

    • Asyncrat family

    • Target

      41dc6460e6f99bd865a3456e9c0348c8.exe

    • Size

      35KB

    • MD5

      41dc6460e6f99bd865a3456e9c0348c8

    • SHA1

      53e57c20f37d27d72d3e950c5820306df1276cb6

    • SHA256

      9120702296c18b9df13b6b7556ce965b70bb76c011850e3a85d9af186256462a

    • SHA512

      9652e7fa688d39bbe996fa27a8b400a6661150c83069425606ea82fbb66af6da5461667d7aa9fa49bc4ed8c7de68ad192f62d1728b744546dea746e4320364b0

    • SSDEEP

      384:W4Ln0QH2AnOAd6LXjD4xB/Z+XmXi3LRGpkFTBLTz9I/RFZwrJi+K5kViso6LtVdo:9ZSW+X/4xBcW2LXF19I5Z6LOjhofbJ+

    Score
    10/10
    • Detect Xworm Payload

    • Xworm

      Xworm is a remote access trojan written in C#.

    • Xworm family

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      4202cc1a54d458c6b3a7579733cc35c1.exe

    • Size

      1.6MB

    • MD5

      4202cc1a54d458c6b3a7579733cc35c1

    • SHA1

      db3f6aee406b73fb0a831cf988b98282d7516918

    • SHA256

      545876aff174a4c02160e0c1b7e3d513f9010daa140b1e287883e2387aca8a96

    • SHA512

      b2423ec0ed40f7de79b0e8248858354e1d5fee95b66f72612048aace23e1e0d39945cd769ff7866adbc41cbb7f90983f438f8667ddff6fbc8445eb76ba2fac92

    • SSDEEP

      24576:Msm8JijftfWIqZpyh/X6bSmV2GKz1oncoiF9GFwUvpHk3tSfEybcswrJ4gOEGEk:MD8Jijt+xpS/ekYmLGdhEAf7bCcjE

    • DcRat

      DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

    • Dcrat family

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • DCRat payload

      Detects payload of DCRat, commonly dropped by NSIS installers.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Target

      4227543d6caf9c96a1ecdceb233e7a0b225f1dcb7baf02087183829d55361f7e.exe

    • Size

      5.5MB

    • MD5

      7f7385efa4f3d9aca3969f1b37c1d2bf

    • SHA1

      1dd769bb96cf7c3eed8fa45b0396d3dfdd8c6d07

    • SHA256

      4227543d6caf9c96a1ecdceb233e7a0b225f1dcb7baf02087183829d55361f7e

    • SHA512

      83258a578fb0dd34321bf5d25505440a85b8ef3e10edb1e7e5974cd0a0501acf47ae140c9791304b928c281bc58022bbff56083f6a1d4cbd8ad4d8e212a1107f

    • SSDEEP

      98304:gsE3+83BZM7IaS+LQzrIir31CK0TW7KKZk5O3oIkXliTGoSVu:c+81gKUW725O350iGoSVu

    Score
    10/10
    • Xmrig family

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

    • Target

      424fdd032528ca656b1513d1ca79a17116a6770be9d2f05a4e203c95d0b4dd46.exe

    • Size

      936KB

    • MD5

      69ba1c008b0f8ea902c7e445b5ac3d6e

    • SHA1

      81bab9899e1437d5ee91d8cb9e0037a39af89220

    • SHA256

      424fdd032528ca656b1513d1ca79a17116a6770be9d2f05a4e203c95d0b4dd46

    • SHA512

      64f015ac5e171aebfa1d09aa834309f51dca72164f5e798b0703a127376941d767b26bb25ad4443311331be0b4c5b20ded8725dec1fc11bea4fcde5ed5ce6bf2

    • SSDEEP

      24576:9dtP2cbksTpugRNJI5kFMJF9OWjwjLOjZXr:+gq1r

    • NanoCore

      NanoCore is a remote access tool (RAT) with a variety of capabilities.

    • Nanocore family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

    • Target

      4255dacb3601f46615055d9d23a538cd.exe

    • Size

      43KB

    • MD5

      4255dacb3601f46615055d9d23a538cd

    • SHA1

      ec34d0c3dc3116f32eee59fc6b84ea0be8030529

    • SHA256

      47dacc41ba9109e87ed4b26564fd6c20b4dfd7c457d0b5b2a32bf45b132da3df

    • SHA512

      084feb9bf61e3641ade20c5c2c2049ec5d4ba1ce85ed5dcbd16c16b4d2dda1c15bdc86ba5ecf86d54676dd5efbe12c147e1e5dba87d29df64aba11a640b15505

    • SSDEEP

      384:eZyDwNU1SoycwJmz0ZmhYYNE4OmMbycXzRpO9D9O5UE5QzwBlpJNakkjh/TzF7p0:kXqglcwJZQE/RycX3vQO+dK+L

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks

static1

ratdefaultminerhackeddcratlimeratasyncratxwormxmrignjratsectoprat
Score
10/10

behavioral1

dcratdefense_evasionexecutioninfostealerpersistencerattrojan
Score
10/10

behavioral2

dcratdefense_evasionexecutioninfostealerpersistencerattrojan
Score
10/10

behavioral3

dcratinfostealerrat
Score
10/10

behavioral4

dcratinfostealerrat
Score
10/10

behavioral5

collectioncredential_accessdiscoverypersistencespywarestealer
Score
10/10

behavioral6

collectioncredential_accessdiscoverypersistencespywarestealer
Score
10/10

behavioral7

Score
1/10

behavioral8

Score
1/10

behavioral9

discovery
Score
3/10

behavioral10

discovery
Score
3/10

behavioral11

limeratdiscoveryrat
Score
10/10

behavioral12

limeratdiscoveryrat
Score
10/10

behavioral13

dcratinfostealerpersistencerat
Score
10/10

behavioral14

dcratinfostealerpersistencerat
Score
10/10

behavioral15

persistence
Score
7/10

behavioral16

persistence
Score
7/10

behavioral17

dcratinfostealerrat
Score
10/10

behavioral18

dcratinfostealerrat
Score
10/10

behavioral19

Score
1/10

behavioral20

defense_evasionevasionpersistenceprivilege_escalationtrojan
Score
10/10

behavioral21

asyncratdefaultdiscoveryrat
Score
10/10

behavioral22

asyncratdefaultdiscoveryrat
Score
10/10

behavioral23

xwormrattrojan
Score
10/10

behavioral24

xwormrattrojan
Score
10/10

behavioral25

dcratexecutioninfostealerrat
Score
10/10

behavioral26

dcratexecutioninfostealerrat
Score
10/10

behavioral27

xmrigminer
Score
10/10

behavioral28

xmrigminer
Score
10/10

behavioral29

nanocorediscoverykeyloggerpersistencespywarestealertrojan
Score
10/10

behavioral30

nanocorediscoverykeyloggerpersistencespywarestealertrojan
Score
10/10

behavioral31

njrathackeddiscoverypersistencetrojan
Score
10/10

behavioral32

discoverypersistence
Score
7/10