Overview
overview
3Static
static
1Payload/Ho...ot Tub
macos-10.15-amd64
1Payload/Ho...fig.py
ubuntu-18.04-amd64
Payload/Ho...fig.py
debian-9-armhf
Payload/Ho...fig.py
debian-9-mips
Payload/Ho...fig.py
debian-9-mipsel
email/mime...art.py
windows7-x64
3email/mime...art.py
windows10-2004-x64
3email/mime/text.py
windows7-x64
3email/mime/text.py
windows10-2004-x64
3email/parser.py
windows7-x64
3email/parser.py
windows10-2004-x64
3email/policy.py
windows7-x64
3email/policy.py
windows10-2004-x64
3email/quoprimime.py
windows7-x64
3email/quoprimime.py
windows10-2004-x64
3email/utils.py
windows7-x64
3email/utils.py
windows10-2004-x64
3encodings/__init__.py
windows7-x64
3encodings/__init__.py
windows10-2004-x64
3encodings/aliases.py
windows7-x64
3encodings/aliases.py
windows10-2004-x64
3encodings/ascii.py
windows7-x64
3encodings/ascii.py
windows10-2004-x64
3encodings/...dec.py
windows7-x64
3encodings/...dec.py
windows10-2004-x64
3encodings/big5.py
windows7-x64
3encodings/big5.py
windows10-2004-x64
3encodings/...scs.py
windows7-x64
3encodings/...scs.py
windows10-2004-x64
3encodings/...dec.py
windows7-x64
3encodings/...dec.py
windows10-2004-x64
3encodings/charmap.py
windows7-x64
3Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Hot Tub.app/Hot Tub
Resource
macos-20241106-en
Behavioral task
behavioral2
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral3
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral4
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral5
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral6
Sample
email/mime/nonmultipart.py
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
email/mime/nonmultipart.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
email/mime/text.py
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
email/mime/text.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
email/parser.py
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
email/parser.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral12
Sample
email/policy.py
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
email/policy.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
email/quoprimime.py
Resource
win7-20241023-en
Behavioral task
behavioral15
Sample
email/quoprimime.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral16
Sample
email/utils.py
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
email/utils.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
encodings/__init__.py
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
encodings/__init__.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
encodings/aliases.py
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
encodings/aliases.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral22
Sample
encodings/ascii.py
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
encodings/ascii.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
encodings/base64_codec.py
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
encodings/base64_codec.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
encodings/big5.py
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
encodings/big5.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
encodings/big5hkscs.py
Resource
win7-20241023-en
Behavioral task
behavioral29
Sample
encodings/big5hkscs.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral30
Sample
encodings/bz2_codec.py
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
encodings/bz2_codec.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral32
Sample
encodings/charmap.py
Resource
win7-20240903-en
General
-
Target
email/policy.py
-
Size
10KB
-
MD5
bd1dd489c77ae052b01d8f00349cbd35
-
SHA1
b6ed2bb611541421a152b0181b3d8dce606aa449
-
SHA256
ca1b94f27db711094e9ba3ec4419313c3e660d1016f4bf01d467e5a174bb6302
-
SHA512
004ce439c3b9ff3511d9d3ac7a2a85531088da41b236066f2551945f3f6227d53fdce02a6b7332b9b91460c10b2bfc8aedee7f82a7c2e3dd63a80d664885796e
-
SSDEEP
192:9FsShSVVbT6AGKJU/LYSKISo/BgTbtt3cQ+evaaLyfuSbT/C:96ShQZT6SJUUnoOTbtyevaBfFTK
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2680 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2680 AcroRd32.exe 2680 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2608 wrote to memory of 2956 2608 cmd.exe 31 PID 2608 wrote to memory of 2956 2608 cmd.exe 31 PID 2608 wrote to memory of 2956 2608 cmd.exe 31 PID 2956 wrote to memory of 2680 2956 rundll32.exe 32 PID 2956 wrote to memory of 2680 2956 rundll32.exe 32 PID 2956 wrote to memory of 2680 2956 rundll32.exe 32 PID 2956 wrote to memory of 2680 2956 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\email\policy.py1⤵
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\email\policy.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\email\policy.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2680
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d3ee3bded8eb254244a196573c1fbcdd
SHA1421631239807c9563685c4bd3c7636f750577215
SHA256d247d42d34c2cc8c2ff64b44f3889fd9fb2f64d4151880f01d32407dc674d903
SHA512fd59f8eb13d3a2c0129174d165dcf816cc386ad62567d3c20b1638a821abcee7b4b543214901d7e3129a0d78dc7beff5c5468d8ea6c2a3e71a12cbbecdb59f3f