File: input_file.bin
| Field | Value |
| Parser | FooParser |
| File Path | C:/input_file.bin |
| Description | SuperMalware Implant |
| Architecture | |
| MD5 | 1e50210a0202497fb79bc38b6ade6c34 |
| SHA1 | baf34551fecb48acc3da868eb85e1b6dac9de356 |
| SHA256 | 1307990e6ba5ca145eb35e99182a9bec46531bc54ddf656a602c780fa0240dee |
| Compile Time | |
Alphabet
| Alphabet | Base |
| 0123456789ABCDEF | 16 |
| ABCDEFGHIJKLMNOPQRSTUVWXYZ234567= | 32 |
| ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/= | 64 |
Credential
| Username | Password |
| admin | 123456 |
| mruser | |
| | secrets |
| admin | pass |
Decoded String
| Value | Key | Algorithm |
| GetProcess | | |
| badstring | 0xffff | xor |
Email Address
Encryption Key
| Key | Algorithm | Mode | Iv |
| 0x68656c6c6f ("hello") | rc4 | | |
| 0xffffffff | aes | ecb | 0x00000000 |
| 0xffff | xor | | |
Event
Injection Process
Interval
Mission ID
Mutex
Path
| Path | Directory Path | Name | Is Dir |
| C:\windows\temp\1\log\keydb.txt | C:\windows\temp\1\log | keydb.txt | False |
| %APPDATA%\foo | %APPDATA% | foo | True |
| C:\foo\bar.txt | C:\foo | bar.txt | False |
| | | malware.exe | False |
| %System%\svohost.exe | %System% | svohost.exe | False |
Pipe
RSA Private Key
| Value |
Modulus (n):
187 (0xbb)
Public Exponent (e):
7 (0x7)
Private Exponent (d):
23 (0x17)
p:
17 (0x11)
q:
11 (0xb)
d mod (p-1):
7 (0x7)
d mod (q-1):
3 (0x3)
(inverse of q) mod p:
14 (0xe)
|
RSA Public Key
| Value |
Modulus (n):
187 (0xbb)
Public Exponent (e):
7 (0x7)
|
Registry
| Tags | Path | Key | Value | Data |
| | HKLM\Software\Microsoft\Windows\CurrentVersion\Run\Updater | HKLM\Software\Microsoft\Windows\CurrentVersion\Run | Updater | c:\update.exe |
| | | HKLM\Foo\Bar | | |
| tag2 | | | Baz | |
Service
| Name | Display Name | Description | Image |
| WindowsUserManagement | Windows User Management | Provides a common management to access information about windows user. | %System%\svohost.exe |
Socket
| Address | Port | Network Protocol | Listen |
| bad.com | 21 | tcp | |
| | 1635 | udp | |
| | 4568 | tcp | True |
| 10.11.10.13 | 443 | | |
| 192.168.1.1 | 80 | tcp | |
| badhost.com | 21 | | |
URL
| Tags | Url | Address | Port | Path | Application Protocol | Network Protocol | Username | Password |
| | https://10.11.10.13:443/images/baner.jpg | 10.11.10.13 | 443 | /images/baner.jpg | https | | | |
| proxy | | 192.168.1.1 | 80 | | | tcp | admin | pass |
| | ftp://badhost.com:21 | badhost.com | 21 | | ftp | | admin | pass |
UUID
| Value |
| 654e5cff-817c-4e3d-8b01-47a6f45ae09a |
User Agent
| Value |
| Mozilla/4.0 (compatible; MISE 6.0; Windows NT 5.2) |
Version
Miscellaneous
| Tags | Key | Value |
| | misc_info | some miscellaneous info |
| | random_data | b'\xde\xad\xbe\xef' |
| | keylogger | True |
| tag1 | misc_integer | 432 |
Residual Files
| Filename | Description | MD5 | Arch | Compile Time |
| config.xml | Extracted backdoor Foo config file | 8c41f2802904e53469390845cfeb2b28 | | |
File Tree
<input_file.bin (1e50210a0202497fb79bc38b6ade6c34) : SuperMalware Implant>