Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
30/03/2025, 17:52
Static task
static1
Behavioral task
behavioral1
Sample
RDDoS_Tool-1.2/RDDoS_Tool.py
Resource
win10ltsc2021-20250314-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
RDDoS_Tool-1.2/setup.sh
Resource
win10ltsc2021-20250314-en
3 signatures
150 seconds
General
-
Target
RDDoS_Tool-1.2/RDDoS_Tool.py
-
Size
5KB
-
MD5
19d57d20cbbb7ac44561da4734195944
-
SHA1
c818c0eac42c267baa1b0bbbb7532585834b1b52
-
SHA256
7d9d0acb8f30998bf9ddf30d69105db7752b5c01e42aa2ea189a1e1a082610be
-
SHA512
5cbaecd848d437a75f02cccda91ebec375040762091db175aa3371b5afb2897d164583de7692ab899662e222e05332fcd977a863e7a24827260aae64f41f3ca9
-
SSDEEP
96:eRoSk89dQGRt5yrB35j4BK0lfwS8Xsd0y08b:HHu3tQN3dKRlfwS8XsdP0q
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-1498259476-758239146-3116387113-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe 6052 OpenWith.exe
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\RDDoS_Tool-1.2\RDDoS_Tool.py1⤵
- Modifies registry class
PID:1656
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:6052
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:2780
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4964