General
-
Target
Virus1.zip
-
Size
7.5MB
-
Sample
250413-1hbfessqz2
-
MD5
5376876aa4d3058a900ad914693f8e73
-
SHA1
d80d62d5872241ac2dadc3191fe6c1676a90b501
-
SHA256
d3898ae65c5d7001787eeb212b79f3d7b83c0e31756a77f87bf64eb09cab0736
-
SHA512
967c920812fbf9b5a281862cfa5bfc2b57ce6b44db53c53d0c7117ed533bfffeb9fe10f3bdd7513ee220ba48241c3c880fb23b0ab4a8598015a05118c20c1503
-
SSDEEP
196608:4GEYEPFwdUM93zw1BrcNhnZWwHqq5GOs9dXX8htEn8FAkn6Brs:aP4UM9jw1Be3GOs7XX8DUBrs
Behavioral task
behavioral1
Sample
Virus1.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
Virus1/Virus1/420-feather.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
+�&<.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
Virus1/Virus1/feather.bat
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
Virus1.zip
-
Size
7.5MB
-
MD5
5376876aa4d3058a900ad914693f8e73
-
SHA1
d80d62d5872241ac2dadc3191fe6c1676a90b501
-
SHA256
d3898ae65c5d7001787eeb212b79f3d7b83c0e31756a77f87bf64eb09cab0736
-
SHA512
967c920812fbf9b5a281862cfa5bfc2b57ce6b44db53c53d0c7117ed533bfffeb9fe10f3bdd7513ee220ba48241c3c880fb23b0ab4a8598015a05118c20c1503
-
SSDEEP
196608:4GEYEPFwdUM93zw1BrcNhnZWwHqq5GOs9dXX8htEn8FAkn6Brs:aP4UM9jw1Be3GOs7XX8DUBrs
Score1/10 -
-
-
Target
Virus1/Virus1/420-feather.exe
-
Size
10.0MB
-
MD5
abbde939de0a4ddb19318a6d962c5838
-
SHA1
21237ccf82d331abeaae44bfb63c2699182eacb2
-
SHA256
395cce2e85f22e508e34e04e78ae810eae210a4f7a734421363cc6789a65468c
-
SHA512
4dffdeb7c0658e31c65514568cef8da297bb6128479db888f1b2bb448b5f35814655a4afc10b4b6ed8920b7edf4efa0db8e7454b5cfd5e4b55991a6a8aba360f
-
SSDEEP
196608:BWk06CxOykwfI9jUCD6rlaZLH7qRGrGIYUoKy8FUsOnAOJ:kbIH20drLYRKjOJ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
+�&<.pyc
-
Size
1KB
-
MD5
5c7fd85cc5b45225eaa472b6ff567502
-
SHA1
8f38cba8a1561e871c11e92b10018ecb0cee5cde
-
SHA256
3a743e363dffb063543b7e835a287a54227961543d3470d811c55c779a048739
-
SHA512
c160fed9b8d4c0e4b1e535df71bf2ad4e5fd0d7efca6d7848847b4632496dc8f638c785383224248bc4203df9d41e5ceb73c81e52d942a5ad9c3e4d6be11ae3e
Score1/10 -
-
-
Target
Virus1/Virus1/feather.bat
-
Size
37B
-
MD5
3a7de8be0cc23a8c30c87df96fa0f642
-
SHA1
61472ac4a26bbb15d82af3d05fc83f3b40ce5cd4
-
SHA256
17042e97c53403f79ddca5d7da8289e48664c399094ac0bc4989494bdd834a60
-
SHA512
9e219a330ac972f2e37af1f6a6484b7095caad8dbb344033b8f9f08d640d7c63c7af636187d131bc030f7ff14b9267fbd5af55a292fb452ee9768ffff0ab9c41
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3