Rv2_Nuker.exe?ex=670f7931&is=670e27b1&hm=22265025fa8bb5baf986ff9795b8348e2c4fa24d4f6cced287e52fcfb45bf1e7&

First submission 2024-10-15 20:10:02

File details

File type: PE32+ executable (GUI) x86-64, for MS Windows
Mime type: application/x-dosexec
File size: 7668.28 KB (7852314 bytes)
Compile time: 2024-09-30 18:20:07
MD5: b459e3a71f72a9ac8a725144d56d1168
SHA1: eefa2e673cabfdcd9d14e4c3e889eedea2bb999b
SHA256: 8fba7c707787d139b5092dab4784995662f3bbaf1a986e6d4bd64bfdcf4a8b30
Import Hash : 72c4e339b7af8ab1ed2eb3821c98713a
Sections 6 .text .rdata .data .pdata .rsrc .reloc
Directories 5 import resource debug relocation security

File features detected

Is DLL
Packers
Anti Debug
Anti VM
Signed
XOR

OSINT Enrichments

Virus Total: 35/77 VT report date: 2024-10-11 17:37:35
Malware Type 2 trojan spyware
Threat Type 3 tedy bdoj dffz

URLs, FQDN and IP indicators 1

URL Host (FQDN/IP) Date Added
hXXps://cdn.discordapp.com/attachments/1282702568899870751/1293852662407888978/Rv2_Nuker.exe?ex=670f7931&is=670e27b1&hm=22265025fa8bb5baf986ff9795b8348e2c4fa24d4f6cced287e52fcfb45bf1e7& VirusTotal Report cdn.discordapp.com VirusTotal Report 2024-10-15 20:10:02

PE Sections 0 suspicious

Name VAddress VSize Size SHA1 MD5 Suspicious
.text 0x1000 0x29f00 172032 2d9a342b9cea10af36a9defffc2a2fd763e338be a6c3b829cc8eaabb1a474c227e90407f
.rdata 0x2b000 0x12a50 76800 9a84a4fafc9bf30f196862704b1169a8347abb35 683a022663edbe65401375c4918bc7ca
.data 0x3e000 0x53f8 3584 069fd3959f91e690643115a296bf21044144de01 dba0caeecab624a0ccc0d577241601d1
.pdata 0x44000 0x2250 9216 09c2a6d5404bc19e11f7eddad07a164b42b01ee6 181312260a85d10a1454ba38901c499b
.rsrc 0x47000 0x9b8 2560 eb592f9f8e0ac0646d4fff5c3bfba37dab8b24c3 d752f24e2059053ead4962457c0a126b
.reloc 0x48000 0x764 2048 d73caf6099972c4407ac22954a7454e922084dc0 816c68eeb419ee2c08656c31c06a0fff

PE Resources 2

Name Language Sublanguage Offset Size Data
RT_VERSION LANG_NEUTRAL SUBLANG_NEUTRAL 0x470a0 1032
RT_MANIFEST LANG_NEUTRAL SUBLANG_NEUTRAL 0x474a8 1293

Meta infos 9

LegalCopyright: \xa9 Microsoft Corporation. All rights reserved.
InternalName: EASPolicyManagerBrokerHost
FileVersion: 10.0.22621.3527 (WinBuild.160101.0800)
CompanyName: Microsoft Corporation
ProductVersion: 10.0.22621.3527
FileDescription: Exchange Active Sync Policy Manager Broker
Translation: 0x0409 0x04b0
OriginalFilename: EASPolicyManagerBrokerHost.exe
ProductName: Microsoft\xae Windows\xae Operating System

Packers detected 2

Microsoft Visual C++ 8.0 (DLL)
Microsoft Visual C++ 8.0

Anti debug functions 6

GetLastError
IsDebuggerPresent
IsProcessorFeaturePresent
RaiseException
TerminateProcess
UnhandledExceptionFilter

File signature

MD5 SHA1 Block size Virtual Address
7c376d23b11698129fdaaac7b6b5b8d4 b2d43454932979d82015c1b8eb8f22393f421099 9288 7843026

Strings analysis - File found

Executable
VV<8.So
Compressed
base_library.zip
bbase_library.zip
Library
mscoree.dll
vcruntime140.dll
ADVAPI32.dll
KERNEL32.dll
8python312.dll
COMCTL32.dll
ucrtbase.dll
bVCRUNTIME140.dll
blibssl-3.dll
blibcrypto-3.dll
bpython312.dll
USER32.dll
bsqlite3.dll
GDI32.dll
blibffi-8.dll

Strings analysis - Possible URLs found 18

http://s.symcb.com/universal-root.crl0
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
http://ocsp.comodoca.com0
https://sectigo.com/CPS0
http://ocsp.sectigo.com0$
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
http://ocsp.sectigo.com0
http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
http://ts-ocsp.ws.symantec.com0;
https://d.symcb.com/rpa0@
https://d.symcb.com/cps0%
http://schemas.microsoft.com/SMI/2016/WindowsSettings
http://crl.comodoca.com/AAACertificateServices.crl04
https://d.symcb.com/rpa0.
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
http://s.symcd.com06
http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0

Import functions

Name Latest seen MD5
discordnitrogen.exe 2024-08-26 11:31:14 2db515aa4c8ba2b4e6878e7e0b550c8f
tac.exe 2024-09-23 16:57:06 8a35be4e0576e642603dc78f07f32a93
Software.exe 2024-09-24 15:24:04 66c1d33fa2373f9f734336b87f123e31
st3amBYluxy.exe?ex=670cd923&is=670b87a3&hm=9d7dba21c2a8ad22d47f3edba77c4617ddfb3d025ff473df74bdf2b60f0c68d1& 2024-10-13 17:33:03 23f733d217275847ffb11bf97827dae8
freenitro.exe?ex=670c1355&is=670ac1d5&hm=fe431b2f20f8cc958563e6e904e1c828290ba1470a54a6f82725608fa4784485& 2024-10-13 19:34:02 8c9efd9a2d9d55aad11203cc4e3c816d
nitrobuyer.exe?ex=670c445a&is=670af2da&hm=1f281fd80c98af4f9fd87d76a7cd35a3e597b77693d1a804430d0000615d585a& 2024-10-13 19:38:03 32554d2f5dcd9927b21b43dda85359c2
mullakka.exe?ex=670c4027&is=670aeea7&hm=c37458cb8f8dc2985499fcc5dd86600a1dda5f7a724709109a97ae24970f4d65& 2024-10-13 20:17:02 136c7ac634c84ad86c1c7340c9262116
FreakyBrowse.exe?ex=670c18f3&is=670ac773&hm=3a26c3c7751649dfe642708c7308021483cb3a3e840a9d7ffd5fdf0ed02746be& 2024-10-13 20:39:02 a2728dfccca75072dd2f6c6a02617ee6
distribution.exe 2024-10-14 12:45:31 2cf67f645897af37ea483ed1aa3b2790
Wahiy_swapper.exe?ex=670e299f&is=670cd81f&hm=d668cc4432184523e29c1a622634c90477a431b1b18691a624773cd7989420a9& 2024-10-14 16:52:04 8e77547b14323977331594025634d90a
worker.exe 2024-10-14 23:10:06 5f08961671234960517cefb9df7a8c41
hydra.exe?ex=670ef165&is=670d9fe5&hm=d1114b65b18c8fc6ac378cf57169ad9d4f23499ced8ea6fe3b1fe96461e38a98& 2024-10-15 20:12:05 d446fa000d260aa78513d383874d82e5
Exela.exe 2024-10-15 21:10:21 83154f0731104f82b198eb13465dfa57