Overview
overview
3Static
static
1Payload/Ho...ot Tub
macos-10.15-amd64
1Payload/Ho...fig.py
ubuntu-18.04-amd64
Payload/Ho...fig.py
debian-9-armhf
Payload/Ho...fig.py
debian-9-mips
Payload/Ho...fig.py
debian-9-mipsel
email/mime...art.py
windows7-x64
3email/mime...art.py
windows10-2004-x64
3email/mime/text.py
windows7-x64
3email/mime/text.py
windows10-2004-x64
3email/parser.py
windows7-x64
3email/parser.py
windows10-2004-x64
3email/policy.py
windows7-x64
3email/policy.py
windows10-2004-x64
3email/quoprimime.py
windows7-x64
3email/quoprimime.py
windows10-2004-x64
3email/utils.py
windows7-x64
3email/utils.py
windows10-2004-x64
3encodings/__init__.py
windows7-x64
3encodings/__init__.py
windows10-2004-x64
3encodings/aliases.py
windows7-x64
3encodings/aliases.py
windows10-2004-x64
3encodings/ascii.py
windows7-x64
3encodings/ascii.py
windows10-2004-x64
3encodings/...dec.py
windows7-x64
3encodings/...dec.py
windows10-2004-x64
3encodings/big5.py
windows7-x64
3encodings/big5.py
windows10-2004-x64
3encodings/...scs.py
windows7-x64
3encodings/...scs.py
windows10-2004-x64
3encodings/...dec.py
windows7-x64
3encodings/...dec.py
windows10-2004-x64
3encodings/charmap.py
windows7-x64
3Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/03/2025, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
Payload/Hot Tub.app/Hot Tub
Resource
macos-20241106-en
Behavioral task
behavioral2
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral3
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral4
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral5
Sample
Payload/Hot Tub.app/Python-iOS_PythonSupport.bundle/lib/python3.10/config-3.10-darwin/python-config.py
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral6
Sample
email/mime/nonmultipart.py
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
email/mime/nonmultipart.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral8
Sample
email/mime/text.py
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
email/mime/text.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral10
Sample
email/parser.py
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
email/parser.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral12
Sample
email/policy.py
Resource
win7-20241010-en
Behavioral task
behavioral13
Sample
email/policy.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral14
Sample
email/quoprimime.py
Resource
win7-20241023-en
Behavioral task
behavioral15
Sample
email/quoprimime.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral16
Sample
email/utils.py
Resource
win7-20240903-en
Behavioral task
behavioral17
Sample
email/utils.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral18
Sample
encodings/__init__.py
Resource
win7-20240729-en
Behavioral task
behavioral19
Sample
encodings/__init__.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral20
Sample
encodings/aliases.py
Resource
win7-20240903-en
Behavioral task
behavioral21
Sample
encodings/aliases.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral22
Sample
encodings/ascii.py
Resource
win7-20241010-en
Behavioral task
behavioral23
Sample
encodings/ascii.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral24
Sample
encodings/base64_codec.py
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
encodings/base64_codec.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral26
Sample
encodings/big5.py
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
encodings/big5.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral28
Sample
encodings/big5hkscs.py
Resource
win7-20241023-en
Behavioral task
behavioral29
Sample
encodings/big5hkscs.py
Resource
win10v2004-20250313-en
Behavioral task
behavioral30
Sample
encodings/bz2_codec.py
Resource
win7-20241010-en
Behavioral task
behavioral31
Sample
encodings/bz2_codec.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral32
Sample
encodings/charmap.py
Resource
win7-20240903-en
General
-
Target
encodings/charmap.py
-
Size
2KB
-
MD5
4b97d8f696820ed83d3a1b96c242c824
-
SHA1
dc08bc88f94c47b43a0c64ba33bda79def11096b
-
SHA256
1b8b5fdb36ce3becc62a6115ed904a17083949ec8aaef5a80f7078cec232f43b
-
SHA512
bdf81c3c80471988203645cc6fe776b0fb44a248d10dc3425b53480c7cbeb5081ecb542930d64aa1f3a007b3b8554d3dad2e0e04e4f767b29335438158f3241a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2752 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2752 AcroRd32.exe 2752 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3008 2424 cmd.exe 29 PID 2424 wrote to memory of 3008 2424 cmd.exe 29 PID 2424 wrote to memory of 3008 2424 cmd.exe 29 PID 3008 wrote to memory of 2752 3008 rundll32.exe 30 PID 3008 wrote to memory of 2752 3008 rundll32.exe 30 PID 3008 wrote to memory of 2752 3008 rundll32.exe 30 PID 3008 wrote to memory of 2752 3008 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\encodings\charmap.py1⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\encodings\charmap.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\encodings\charmap.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58bdc1f90b1b2cd6c93e1e2f7415e0509
SHA1ec1c3c1d1d03e319056cd36fa45a12e5d5f32ac7
SHA25612e6c63f50e08316551fb906ee83ea31cfc049bd7c2083a0585354bd856f85a4
SHA512231c7dd4d76eeddb74e38b6ba8d217bb8f944c7644d092a9364fa18749f1450a6717a1653af6c3ec2cd0cbc7a772c1a7efc3c3c643edb4c68315cb24120668ae