General
-
Target
12740963278.zip
-
Size
3.7MB
-
Sample
231108-l8y7vahe7t
-
MD5
fe88ee57db82e5768bcdcfb4d787a39a
-
SHA1
9ad627334500a403290043eadc741c94b74e7c34
-
SHA256
85fe94a88b9473bbc1a7f292885326bd164e6a7d8cff2232bd716ea367fd6914
-
SHA512
bc1045526c18c906641f09b57e28e09dc5c9557f3458af3e659b8388dfd68851abe76653cf0e2575e609aaf3c9fcc264b63b8db8bd3fa39f102ad8aa40051898
-
SSDEEP
98304:OLOTxEsYarjA36KQ9XLpOZVkjfZ7IPjbEWGLHgsM1LEG+:OyTCa3AqvezkjR7ILbEWYJ
Behavioral task
behavioral1
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
milleniumrat
https://api.telegram.org/bot6597086550:AAH-iMklHZd9G4OC7i-qH_lJ-F4S0eEVjPM/sendMessage?chat_id=2024893777
Targets
-
-
Target
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
-
Size
5.3MB
-
MD5
eba4be8ed0e9282976f8ee0b04fb2474
-
SHA1
f4d698ece0ff6af36c1a2e9108ea475518df0aa7
-
SHA256
6d207c1e954f9d60f693e17e63df73fb8e954d02544b5d52b8b18c4ab86a267e
-
SHA512
cbce4f46440f948f7fa4cf502df86a54f4a5aa76afa469fa26187fdbaab63781ceffab31f1178fce21ccf57d159e4527494758c42c55b25ce5fa1c2fc6f0a84b
-
SSDEEP
98304:g4VEl27OuKr+gvhf2Z9Nzm31PMogNuSZTKA0t9FFPEzlkqXf0FKp806UcR:guXOuK6mq9NzgMoIbk9fcpkSIKpb6UcR
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-