Edit tour
Windows
Analysis Report
Aurora.exe
Overview
General Information
Detection
Aurora, Quasar, RedLine, Xmrig
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Sigma detected: Schedule system process
Sigma detected: Set autostart key via New-ItemProperty Cmdlet
Yara Aurora Stealer
Yara detected AntiVM3
Yara detected Quasar RAT
Yara detected RedLine Stealer
Yara detected Xmrig cryptocurrency miner
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Creates multiple autostart registry keys
DNS related to crypt mining pools
Detected Stratum mining protocol
Drops PE files with benign system names
Found direct / indirect Syscall (likely to bypass EDR)
Found evasive API chain (may stop execution after checking mutex)
Found many strings related to Crypto-Wallets (likely being stolen)
Hides that the sample has been downloaded from the Internet (zone.identifier)
Hides threads from debuggers
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies power options to not sleep / hibernate
PE file contains section with special chars
Query firmware table information (likely to detect VMs)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Suspect Svchost Activity
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Uses known network protocols on non-standard ports
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
PE file does not import any functions
PE file overlay found
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Copy From or To System Directory
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses cacls to modify the permissions of files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
- Aurora.exe (PID: 6256 cmdline:
"C:\Users\ user\Deskt op\Aurora. exe" MD5: 416DE11D210AE0FF50214021FF57B32B) - AdobeUpdate.exe (PID: 3064 cmdline:
"C:\Users\ user\AppDa ta\Roaming \AdobeLice nse\AdobeU pdate.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35) - cmd.exe (PID: 1220 cmdline:
C:\Windows \system32\ cmd.exe /c start cmd /Q /C " p ing localh ost -n 1 & & copy "C: \Users\use r\AppData\ Roaming\Ad obeLicense \AdobeUpda te.exe" "C :\Users\us er\AppData \Local\Mse dge.exe" & & attrib + r +h +a "C :\Users\us er\AppData \Local\Mse dge.exe" & & icacls " C:\Users\u ser\AppDat a\Local\Ms edge.exe" /deny "eve ryone":(WD ,AD,WEA,WA ) && del " C:\Users\u ser\AppDat a\Roaming\ AdobeLicen se\AdobeUp date.exe" && cmd /C "start "C: \Users\use r\AppData\ Local\Msed ge.exe" && exit" && && exit " MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 6204 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 1516 cmdline:
cmd /Q /C " ping loc alhost -n 1 && copy "C:\Users\ user\AppDa ta\Roaming \AdobeLice nse\AdobeU pdate.exe" "C:\Users \user\AppD ata\Local\ Msedge.exe " && attri b +r +h +a "C:\Users \user\AppD ata\Local\ Msedge.exe " && icacl s "C:\User s\user\App Data\Local \Msedge.ex e" /deny " everyone": (WD,AD,WEA ,WA) && de l "C:\User s\user\App Data\Roami ng\AdobeLi cense\Adob eUpdate.ex e" && cmd /C "start "C:\Users\ user\AppDa ta\Local\M sedge.exe" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 5480 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - PING.EXE (PID: 2004 cmdline:
ping local host -n 1 MD5: 2F46799D79D22AC72C241EC0322B011D) - attrib.exe (PID: 6020 cmdline:
attrib +r +h +a "C:\ Users\user \AppData\L ocal\Msedg e.exe" MD5: 5037D8E6670EF1D89FB6AD435F12A9FD) - icacls.exe (PID: 4828 cmdline:
icacls "C: \Users\use r\AppData\ Local\Msed ge.exe" /d eny "every one":(WD,A D,WEA,WA) MD5: 48C87E3B3003A2413D6399EA77707F5D) - cmd.exe (PID: 6204 cmdline:
cmd /C "st art "C:\Us ers\user\A ppData\Loc al\Msedge. exe MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - Msedge.exe (PID: 7252 cmdline:
C:\Users\u ser\AppDat a\Local\Ms edge.exe MD5: 65F0A85C4B056D6BCEE60C49E2372E35) - build.exe (PID: 6332 cmdline:
"C:\Users\ user\AppDa ta\Roaming \Microsoft Edge\buil d.exe" MD5: C9A9D471428A5F92068C0823E6454254) - conhost.exe (PID: 4192 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - OneDrive.exe (PID: 6972 cmdline:
"C:\Users\ user\AppDa ta\Roaming \OneDrive Update Too l\OneDrive .exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B) - powershell.exe (PID: 3320 cmdline:
"powershel l.exe" Rem ove -ItemP roperty -P ath 'HKCU: \SOFTWARE\ Microsoft\ Windows\Cu rrentVersi on\Run' -N ame 'OneDr iveUpdate' ;New-ItemP roperty -P ath 'HKCU: \SOFTWARE\ Microsoft\ Windows\Cu rrentVersi on\Run' -N ame 'OneDr iveUpdate' -Value '" C:\Users\u ser\AppDat a\Roaming\ OneDriveUp date\OneDr ive Update r.exe"' -P ropertyTyp e 'String' MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC) - conhost.exe (PID: 7188 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - cmd.exe (PID: 6976 cmdline:
"cmd" /C s chtasks /c reate /tn \OneDriveU pdate /tr "C:\Users\ user\AppDa ta\Roaming \OneDriveU pdate\OneD rive Updat er.exe" /s t 00:00 /d u 9999:59 /sc once / ri 60 /rl HIGHEST /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B) - conhost.exe (PID: 7176 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - conhost.exe (PID: 7756 cmdline:
C:\Windows \System32\ conhost.ex e MD5: 0D698AF330FD17BEE3BF90011D49251D) - svchost.exe (PID: 4324 cmdline:
C:\Windows \System32\ svchost.ex e MD5: B7F884C1B74A263F746EE12A5F7C9F6A) - schtasks.exe (PID: 7332 cmdline:
schtasks / create /tn \OneDrive Update /tr "C:\Users \user\AppD ata\Roamin g\OneDrive Update\One Drive Upda ter.exe" / st 00:00 / du 9999:59 /sc once /ri 60 /rl HIGHEST / f MD5: 48C2FE20575769DE916F48EF0676A965) - RegAsm.exe (PID: 7220 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13) - vlc.exe (PID: 7316 cmdline:
"C:\Users\ user\AppDa ta\Roaming \VLC Media Player\vl c.exe" MD5: B9FC8581B52ABFC6B563DA731438E27D) - dw20.exe (PID: 7456 cmdline:
dw20.exe - x -s 1480 MD5: 89106D4D0BA99F770EAFE946EA81BB65)
- cmd.exe (PID: 7376 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7404 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 7496 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7568 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7656 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 7692 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- powershell.exe (PID: 7388 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# npnsokoe#> IF([Syste m.Environm ent]::OSVe rsion.Vers ion -lt [S ystem.Vers ion]"6.2") { schtask s /create /f /sc onl ogon /rl h ighest /tn 'ConsoleW indowsHost ' /tr '''C :\Users\us er\AppData \Roaming\G oogle\Chro me\svchost .exe''' } Else { Reg ister-Sche duledTask -Action (N ew-Schedul edTaskActi on -Execut e 'C:\User s\user\App Data\Roami ng\Google\ Chrome\svc host.exe') -Trigger (New-Sched uledTaskTr igger -AtL ogOn) -Set tings (New -Scheduled TaskSettin gsSet -All owStartIfO nBatteries -Disallow HardTermin ate -DontS topIfGoing OnBatterie s -DontSto pOnIdleEnd -Executio nTimeLimit (New-Time Span -Days 1000)) -T askName 'C onsoleWind owsHost' - RunLevel ' Highest' - Force; } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7396 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- svchost.exe (PID: 7532 cmdline:
C:\Windows \System32\ svchost.ex e -k WerSv cGroup MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
- OneDrive Updater.exe (PID: 7736 cmdline:
"C:\Users\ user\AppDa ta\Roaming \OneDriveU pdate\OneD rive Updat er.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B) - RegAsm.exe (PID: 7880 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
- Msedge.exe (PID: 7996 cmdline:
"C:\Users\ user\AppDa ta\Local\M sedge.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
- OneDrive Updater.exe (PID: 8124 cmdline:
"C:\Users\ user\AppDa ta\Roaming \OneDriveU pdate\OneD rive Updat er.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B) - RegAsm.exe (PID: 8156 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13) - RegAsm.exe (PID: 8164 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13) - RegAsm.exe (PID: 8172 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13) - RegAsm.exe (PID: 8180 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13) - RegAsm.exe (PID: 8188 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
- Msedge.exe (PID: 7408 cmdline:
"C:\Users\ user\AppDa ta\Local\M sedge.exe" MD5: 65F0A85C4B056D6BCEE60C49E2372E35)
- cmd.exe (PID: 7672 cmdline:
C:\Windows \System32\ cmd.exe /c powercfg /x -hibern ate-timeou t-ac 0 & p owercfg /x -hibernat e-timeout- dc 0 & pow ercfg /x - standby-ti meout-ac 0 & powercf g /x -stan dby-timeou t-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE) - conhost.exe (PID: 7696 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D) - powercfg.exe (PID: 7436 cmdline:
powercfg / x -hiberna te-timeout -ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 1196 cmdline:
powercfg / x -hiberna te-timeout -dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 5812 cmdline:
powercfg / x -standby -timeout-a c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705) - powercfg.exe (PID: 2756 cmdline:
powercfg / x -standby -timeout-d c 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
- powershell.exe (PID: 7404 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# npnsokoe#> IF([Syste m.Environm ent]::OSVe rsion.Vers ion -lt [S ystem.Vers ion]"6.2") { schtask s /create /f /sc onl ogon /rl h ighest /tn 'ConsoleW indowsHost ' /tr '''C :\Users\us er\AppData \Roaming\G oogle\Chro me\svchost .exe''' } Else { Reg ister-Sche duledTask -Action (N ew-Schedul edTaskActi on -Execut e 'C:\User s\user\App Data\Roami ng\Google\ Chrome\svc host.exe') -Trigger (New-Sched uledTaskTr igger -AtL ogOn) -Set tings (New -Scheduled TaskSettin gsSet -All owStartIfO nBatteries -Disallow HardTermin ate -DontS topIfGoing OnBatterie s -DontSto pOnIdleEnd -Executio nTimeLimit (New-Time Span -Days 1000)) -T askName 'C onsoleWind owsHost' - RunLevel ' Highest' - Force; } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7324 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- OneDrive Updater.exe (PID: 2936 cmdline:
"C:\Users\ user\AppDa ta\Roaming \OneDriveU pdate\OneD rive Updat er.exe" MD5: 3B4F58CD4BCA7274BE25E885BE00798B) - RegAsm.exe (PID: 7932 cmdline:
#cmd MD5: 0D5DF43AF2916F47D00C1573797C1A13)
- powershell.exe (PID: 7764 cmdline:
C:\Windows \System32\ WindowsPow erShell\v1 .0\powersh ell.exe <# lygkxs#> I F([System. Environmen t]::OSVers ion.Versio n -lt [Sys tem.Versio n]"6.2") { schtasks /create /f /sc onlog on /rl hig hest /tn ' ConsoleWin dowsHost' /tr '''C:\ Users\user \AppData\R oaming\Goo gle\Chrome \svchost.e xe''' } El se { Regis ter-Schedu ledTask -A ction (New -Scheduled TaskAction -Execute 'C:\Users\ user\AppDa ta\Roaming \Google\Ch rome\svcho st.exe') - Trigger (N ew-Schedul edTaskTrig ger -AtLog On) -Setti ngs (New-S cheduledTa skSettings Set -Allow StartIfOnB atteries - DisallowHa rdTerminat e -DontSto pIfGoingOn Batteries -DontStopO nIdleEnd - ExecutionT imeLimit ( New-TimeSp an -Days 1 000)) -Tas kName 'Con soleWindow sHost' -Ru nLevel 'Hi ghest' -Fo rce; } MD5: 04029E121A0CFA5991749937DD22A1D9) - conhost.exe (PID: 7736 cmdline:
C:\Windows \system32\ conhost.ex e 0xffffff ff -ForceV 1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Aurora | Ransomware |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Quasar RAT, QuasarRAT | Quasar RAT is a malware family written in .NET which is used by a variety of attackers. The malware is fully functional and open source, and is often packed to make analysis of the source more difficult. |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
RedLine Stealer | RedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer. | No Attribution |
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
xmrig | According to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information. | No Attribution |
{"Version": "1.4.1", "Host:Port": "auroraforge.art:55326;thesirenmika.com:55713;", "SubDirectory": "SubDir", "InstallName": "up2.exe", "MutexName": "0cbdfe7f-0215-41e8-a7b5-d4fbbc555089", "StartupKey": "Quasar Client Startup", "Tag": "themdas", "LogDirectoryName": "Logs", "ServerSignature": "PlHMOMtgocXM3HQK38PG08Pjiit+NwEciQu5lPY8tfLnYjCoMZYAx0xtdI+SvG5C0DXq12cXcC0umf/mq9foVZXMNF5Hs2PQTK2JDMn/hRfIF+Jjsb6WM+BVxpI718gj4lZGbCgGkF84rco627EYC7FkvV+GH8BLt9O9hPr4/+rJiNgiCoIYMn0OgCE/sH3sGydQJg57bn9U/mXFlhyIRhtm4gg2lM1G8RQ2XH+1kM20YvujsfPY0iStU8ykEpDnPvo2nlJo9S9+MJkEMt42ESO7Wgwea2ACoL2QuywV5GfCFYmzHmw9IDaqA/y7WyvVIvEg0NoGsezhwo2e6oEJrvYMUde6OTHjwHC8kacIVCvh6+yByGXPCjdQ+H6smKrq+LpoQLVQ20Io+hUnJLLx3faDB+Mrdo/wn43FOeeY6pvde3SMsY1XpENL1JPs8GG3TI0La479nFehiVp1bownoMxD7bv5pz2OTSwC+bmeB/u6k/e0qAPIfFzFMlMKPBLs1ee2ZhtAAu9MNcYtT4iTjxGRo+BdYz4VzLF0YuR7gW/KXvxHfHzIxl5gsQqlHmTKIvmwkZApWd13KsPue7aMCNBNetMgKotbQLGwuPGWkXPtyVe3zbXV84yx9a8EXdQy2rBif3ikTmvhQzPtqeUrXJzqUAZPzqvnfpFUeP+/3c0=", "ServerCertificate": "MIIE9DCCAtygAwIBAgIQAMFuuJQ2UWVtaIczUNgeazANBgkqhkiG9w0BAQ0FADAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMCAXDTIzMDQwMzA0MDUwOFoYDzk5OTkxMjMxMjM1OTU5WjAbMRkwFwYDVQQDDBBRdWFzYXIgU2VydmVyIENBMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAiClM+MYvRIRZkg0freUTCe0NshHnHXvYh8i2/B6np2DSYc6syzKH/d4kemUxEeD770K+4fsX42DqD05wvk+SmcuwHZ26OYCKSI/rg79364nUGWDwdTjS2LOpVzPfC/rF+aUI5X41YVO/BOt8Kw8yb2j1/uUVNajjm2gM7Wy3DAKG2PUXFGK/xtJsuOfjWVEFEStZGs5EbE5kMuNzxU3UfatoLZCVW866YNZIs9KIwFLYBaxoBScqJVcpRql2nDMOyOZt+wocL9l5buEIyKqT4sdRNUfoAUv6kxgo23l9f/dOMxG4eLYd7rNf6r5l0xRJMaz7emiUnqYyibaBmC2fIv6fuyjPZn9QB4+ujg0OGaWAPnikZXEd1F5jy4jwnBqilo+Kx5UdXg00pqVYBXr+K3AzcMzc02Yqwr3J8Rlfgsu4C6BVbHUY6AXA+8xzbyLK3fvp0M9Dxs8DKw7UpkZ7Bolhy8NE3LRgI7TFHXNjRzM8u5ZiCL8VIUOsDgUFKakEh0MrGEaHZUG3VjUO0xDdA7CG9s8FQ5mYPH2NlORjReWcdoJurPogIffwNkP6nIgltEwBuVufNrMjtUDq3GUNiuhG5GJnDVypRGAOJEeOkug+OMfFmTDhOAWuPsvr+dhak7ue/4FlW2gxA+HRlw200v70/hHbpNv66ypjWg1X9jECAwEAAaMyMDAwHQYDVR0OBBYEFEZ+DMcRz+rZt2AYOssjt4gJDXJOMA8GA1UdEwEB/wQFMAMBAf8wDQYJKoZIhvcNAQENBQADggIBAHAGY8cy4TMd3uimwhX4giP4+xh3Nf0FVipqVxteNQTqxP7t2BabEdhmtlh7O/QY0NrQcHZfTQ0N17MnczuHDPsE41keL18jYueJZ+yId43zFc3Rlez8W4nrId2DbbcCRffmYSuwAGvXfcZDOYrTOpXFdU1WeVOazRUYYyrlBUZfOX+lbLHSlho/C7/6ULvYz9LIC1WakGFjLt8Yw5jpWSBPjGpbOUNIZ0JFalvr7iCrrNEtsLEQs5rcoiH73TBGE1QDgTOz/4zp6WRNoRr9Yy5mbC2qB2RbAtMIydKX/3yBZw/gHBGK7bxGmcecLwYVFkLR/BvfcpdVP4Jy5O65oEx01sFfC3TMG+XyGV3CxOvoG4brCW99GDZmUWsVmmbSI+X2caujvstj6psjYeRcGUELmU6dPNxWTNUOeeppRDQfZeA0rEr5pecx4NMCj6nLrhRUlTQ6pXg6vpVt2PS+5xC5qgn839Ic5RehAccmgHat+VqnqlqF9oucwNJVDoOcNey0yAYXMPqM6KZrVsrEGmxljkuqaafi9CJJbSah9K6YMfZdZsPxlNnLmg3CcSNISkL602S3tiWO1/heTAFVK6dx1domDE4Lk6Y7hEqEdDfyokDNExRPfD5ngHpseHXEYQteQywDb5MZZc7XLHM4dgm3cRxnGtWR0H7SjMddMZ5C"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Xmrig | Yara detected Xmrig cryptocurrency miner | Joe Security |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen |
|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
Click to see the 25 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_RedLine | Yara detected RedLine Stealer | Joe Security | ||
Windows_Trojan_RedLineStealer_f54632eb | unknown | unknown |
| |
MALWARE_Win_RedLine | Detects RedLine infostealer | ditekSHen |
| |
JoeSecurity_Quasar | Yara detected Quasar RAT | Joe Security | ||
Click to see the 22 entries |
System Summary |
---|
Source: | Author: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: Jonathan Cheong, oscd.community: |
Source: | Author: David Burkett, @signalblur: |
Source: | Author: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): |
Source: | Author: Florian Roth (Nextron Systems), Markus Neis, Tim Shelton (HAWK.IO), Nasreddine Bencherchali (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Florian Roth (Nextron Systems): |
Source: | Author: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): |
Source: | Author: vburov: |
Persistence and Installation Behavior |
---|
Source: | Author: Joe Security: |