Managed XDR
Group-IB MDP Report
File info
Filename: c-users-user-appdata-local-temp-tduwnbmi.ivl-silver-rat-fud-crypter.jar
File Type: Zip archive data, at least v2.0 to extract
File Size: 722 KB
Env info
win7/x86 en
Hashes
SHA1: c169b4df3fa32fa3c04e6a08a20bd365ed9f86ca
SHA256: 03b38c57dd96573d783bc9dbfde5695839bb22ac67906b0832c4b57c075534d7
MD5: 2bc41791e8833241da8925cb077c4e85
Signatures
Persistence
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
Privilege Escalation
T1547.001 persistence_autorun: Makes itself run automatically on Windows startup
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1564.001 stealth_file: Creates hidden or system files
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Other
networkdyndns_checkip: Connects to a Dynamic DNS domain
creates_in_programdata: Creates files in the ProgramData directory
suricata_alert: Malicious traffic detected
Managed XDR