Managed XDR
Group-IB MDP Report
File info
Filename: home-cjq-hybrid_feature_gan-patched-classic_mlp_malconv0_wass_0.1_28_-aa487780c861e3475fcbe380b6e7...8b5f613d9ce19b8705b6e5f2117db_9b3ffafc0184d15dc7efbe16cd3849a68313c31251b31506c9bd2805188cca55.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 299.7 KB
Env info
win7/x86 en
Hashes
SHA1: 9a2dc3b33d00d9cb1429cf55c591e2a86a5362d2
SHA256: 9b3ffafc0184d15dc7efbe16cd3849a68313c31251b31506c9bd2805188cca55
MD5: cd999ccbdca3dc6db423858c6a4399ed
Malwares
Stealc
Mars Stealer
Signatures
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1480 system_default_lang_id_present: Checks the system language
T1497.001 antivm_queries_computername: Retrieves the computer name
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1555.004 windows_credential_manager: Acquire credentials from the Windows Credential Manager
Discovery
T1497.001 antivm_queries_computername: Retrieves the computer name
Other
yara_rules: Static rules
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
pe_overlay: PE file contains overlay
Managed XDR