General
-
Target
a9f80081caaebd471dd15b2c5d5383680edf4245534a968b7aedfb53d7a046bb.zip
-
Size
250KB
-
Sample
250327-a4nd1axnt7
-
MD5
3aae6e15295a585bca71b54350f517b8
-
SHA1
f4de524aa2604df5a65db22d196bf7ddaa71de31
-
SHA256
a9f80081caaebd471dd15b2c5d5383680edf4245534a968b7aedfb53d7a046bb
-
SHA512
b0e9b3a9ecac62927d5216c2952d5d94a9eca9c75f4b6dc86d5b8613a39ac0805a1be1885def579c4fe51096fd6ad241d8fc47dd8d36641aceab026b0f37d7f3
-
SSDEEP
6144:2fD1cCdBYl67DuBpK7FJz+j6v0yRyHIDubTXA/B:2fD1cCBYlWdHz+jA0Hyj
Static task
static1
Behavioral task
behavioral1
Sample
Trojan.MrsMajor3.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Trojan.MrsMajor3.0.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Trojan.MrsMajor3.0.exe
-
Size
381KB
-
MD5
35a27d088cd5be278629fae37d464182
-
SHA1
d5a291fadead1f2a0cf35082012fe6f4bf22a3ab
-
SHA256
4a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69
-
SHA512
eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5
-
SSDEEP
6144:Th3idhONY259BH1DzJ5PzVNtGgc+F9TBd096cTKAsLEbqqbd+VWM8AHiKn9SlXNA:Th3iXPw9Tc6kVXMHHLEf8l7
Score10/10-
UAC bypass
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Obfuscated with Agile.Net obfuscator
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
-