Overview
overview
10Static
static
3builder.exe
windows10-2004-x64
3d_esxi.out
ubuntu-18.04-amd64
1d_nas_arm.out
debian-12-armhf
3d_nas_x86.out
ubuntu-22.04-amd64
3d_win.exe
windows10-2004-x64
7e_esxi.out
ubuntu-22.04-amd64
1e_nas_arm.out
debian-9-armhf
3e_nas_x86.out
ubuntu-22.04-amd64
3e_win.exe
windows10-2004-x64
10Analysis
-
max time kernel
103s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2025, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
builder.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
d_esxi.out
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral3
Sample
d_nas_arm.out
Resource
debian12-armhf-20250410-en
Behavioral task
behavioral4
Sample
d_nas_x86.out
Resource
ubuntu2204-amd64-20250410-en
Behavioral task
behavioral5
Sample
d_win.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
e_esxi.out
Resource
ubuntu2204-amd64-20250410-en
Behavioral task
behavioral7
Sample
e_nas_arm.out
Resource
debian9-armhf-20250410-en
Behavioral task
behavioral8
Sample
e_nas_x86.out
Resource
ubuntu2204-amd64-20250307-en
Behavioral task
behavioral9
Sample
e_win.exe
Resource
win10v2004-20250410-en
General
-
Target
d_win.exe
-
Size
68KB
-
MD5
ca8dcb4c02f5b3b09b0bc49452f05bd6
-
SHA1
0e0001da7e198da8e3e82252d5414dbcb8bee9d1
-
SHA256
eb22f22fedb24ef3d06d2ba6ac9bc53528f8d1e489fefeac9501b926a0be6097
-
SHA512
9221c98a0ad3179725fd66de3fcfbc0f97af300431d82645ee0b9d8e16a756b7881a91f661a569156bf0d5984e54703d513d753329bffd382327cc7a194ffc48
-
SSDEEP
1536:yHjUeTD0DsbEmDx1xhiBsrQLOJgY8ZZP8LHD4XWaNH71dLdG1iiFM2iG2hyqM8EQ:yDUeTD0gbrDx1xusrQLOJgY8Zp8LHD4D
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: d_win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d_win.exe
Processes
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1