Managed XDR
Group-IB MDP Report
File info
Filename: home-cjq-hybrid_feature_gan-patched-classic_mlp_malconv0_wass_0.1_28_-aa487780c861e3475fcbe380b6e7...8b5f613d9ce19b8705b6e5f2117db_a689e34e058e21ad136192a9cbf24cd9ceecb7d5ba4541791334514b7c34f196.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 299.7 KB
Env info
win7/x86 en
Hashes
SHA1: e08e1c275d87ec1c087b20408e06c742c6d48318
SHA256: a689e34e058e21ad136192a9cbf24cd9ceecb7d5ba4541791334514b7c34f196
MD5: ab8f15dc10d1b7943c1159d8f422055d
Malwares
Stealc
Mars Stealer
Signatures
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1480 system_default_lang_id_present: Checks the system language
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access
T1555.004 windows_credential_manager: Acquire credentials from the Windows Credential Manager
Discovery
T1497.001 antivm_queries_computername: Retrieves the computer name
Other
yara_rules: Static rules
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
pe_overlay: PE file contains overlay
Managed XDR