Managed XDR
Group-IB MDP Report
File info
Filename: home-cjq-hybrid_feature_gan-patched-classic_mlp_malconv0_wass_0.1_28_-6ca12397ed8fb24d85c5e8391964...518b4e587aad84394757e46a330e1_27b7a435b7d5cc765bcbbfcad0117581c07e346cef3b8f5261b18d1515129d5d.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 330.5 KB
Env info
win7/x86 en
Hashes
SHA1: 7da116486813cee19ed9d446292b7252066cfd53
SHA256: 27b7a435b7d5cc765bcbbfcad0117581c07e346cef3b8f5261b18d1515129d5d
MD5: 6d3c24a84b653cc1564ab58b1ce4f528
Malwares
Stealc
Mars Stealer
Signatures
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1480 system_default_lang_id_present: Checks the system language
T1497.001 antivm_queries_computername: Retrieves the computer name
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1555.004 windows_credential_manager: Acquire credentials from the Windows Credential Manager
Discovery
T1497.001 antivm_queries_computername: Retrieves the computer name
Other
yara_rules: Static rules
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
pe_overlay: PE file contains overlay
Managed XDR