General
-
Target
iVCam_x64_v7.2.0.exe
-
Size
39.1MB
-
Sample
230823-1m63wshb81
-
MD5
b973d55090e3d7f36d266e26116a67c3
-
SHA1
b0319b2533f8a839382ddb4feae9f6bf095c7c58
-
SHA256
952e28b45a93a7f609e8d828314560a0bcb10fd468ba3697b7695ad182f6c02b
-
SHA512
b97181f1579d282b00c0ee062632252c69a42991ec1c69b212a065bad31c33323100cc53092190c16fcbbba1f28c7126fb7453e2b3f655aceae7b31c82fd429e
-
SSDEEP
786432:6OLbtfIjdQj5q93twf3INblad+5ZU5P4RT97C6XU9mvrqbjvOQKEmYT1nmwpz:6cBfIJQQ93agNbYd+km997C809KE11ms
Static task
static1
Behavioral task
behavioral1
Sample
iVCam_x64_v7.2.0.exe
Resource
win10-20230703-en
Malware Config
Targets
-
-
Target
iVCam_x64_v7.2.0.exe
-
Size
39.1MB
-
MD5
b973d55090e3d7f36d266e26116a67c3
-
SHA1
b0319b2533f8a839382ddb4feae9f6bf095c7c58
-
SHA256
952e28b45a93a7f609e8d828314560a0bcb10fd468ba3697b7695ad182f6c02b
-
SHA512
b97181f1579d282b00c0ee062632252c69a42991ec1c69b212a065bad31c33323100cc53092190c16fcbbba1f28c7126fb7453e2b3f655aceae7b31c82fd429e
-
SSDEEP
786432:6OLbtfIjdQj5q93twf3INblad+5ZU5P4RT97C6XU9mvrqbjvOQKEmYT1nmwpz:6cBfIJQQ93agNbYd+km997C809KE11ms
Score10/10-
Modifies firewall policy service
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1