Scan Result:
implant.exe
Sample Information
File Hash | |
Sample Name | |
File Size | 1.4 MB |
First Seen | 2024-11-18, 2 hours, 57 minutes ago. |
Important Imports
- CreateProcessW
- OpenProcess
- Process32First
- Process32Next
- CreateToolhelp32Snapshot
- RegOpenKeyExW
- RegQueryValueExW
- HeapAlloc
- VirtualQuery
- GetProcAddress
- AddVectoredExceptionHandler
- CreateNamedPipeW
- NtQueryInformationProcess
Matching Rules
Rule Name | Rule Type |
---|---|
YARA_DebuggerCheck__RemoteAPI | YARA |
YARA_disable_process | YARA |
YARA_Findcrypt | YARA |
YARA_DetectParentProcess | YARA |
YARA_XOR_Hunt | YARA |
YARA_Base64 | YARA |
Matching Techniques
Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
---|---|---|---|---|
Kill Process | U0403 | |||
Cryptography | U0703 E1027.m04 | |||
Wiping or Encrypting | U0301 | |||
Parent Process Detection | U0404 | |||
XOR Operation | U0701 E1027.m02 | |||
Base64 | U0706 E1027.m02 |