General

  • Target

    ef23f59e2d240e13e9e8d711a13b75e8941cbe412b88220e962ab313716af96d.exe

  • Size

    6.6MB

  • Sample

    231109-paa9xahb9w

  • MD5

    3c4e61f097bc2ff5efa6f56f07560abc

  • SHA1

    4d32b5ca5daaa79db724d1b7c7abd53165f8c675

  • SHA256

    ef23f59e2d240e13e9e8d711a13b75e8941cbe412b88220e962ab313716af96d

  • SHA512

    8e6c0f3b1642656966d36cdc71d9dc3bbcb30b5c590d8dfcfae0d90002733ef40319baa361565106be999465c3f71f3318514782b634c1b73a718a0306580cc8

  • SSDEEP

    196608:eAqjTpnhXlmyWCZNulPKQ8hY/Bkr/fOIT/+VdlBFKazf:kfauN/HYOSIT/EVF9j

Malware Config

Targets

    • Target

      ef23f59e2d240e13e9e8d711a13b75e8941cbe412b88220e962ab313716af96d.exe

    • Size

      6.6MB

    • MD5

      3c4e61f097bc2ff5efa6f56f07560abc

    • SHA1

      4d32b5ca5daaa79db724d1b7c7abd53165f8c675

    • SHA256

      ef23f59e2d240e13e9e8d711a13b75e8941cbe412b88220e962ab313716af96d

    • SHA512

      8e6c0f3b1642656966d36cdc71d9dc3bbcb30b5c590d8dfcfae0d90002733ef40319baa361565106be999465c3f71f3318514782b634c1b73a718a0306580cc8

    • SSDEEP

      196608:eAqjTpnhXlmyWCZNulPKQ8hY/Bkr/fOIT/+VdlBFKazf:kfauN/HYOSIT/EVF9j

    • Beapy

      Beapy is a python worm with crypto mining capabilities.

    • Mimikatz

      mimikatz is an open source tool to dump credentials on Windows.

    • Contacts a large (5107) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (8131) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • mimikatz is an open source tool to dump credentials on Windows

    • Modifies Windows Firewall

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Scheduled Task/Job

1
T1053

Command and Scripting Interpreter

1
T1059

Persistence

Account Manipulation

1
T1098

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Privilege Escalation

Create or Modify System Process

1
T1543

Windows Service

1
T1543.003

Scheduled Task/Job

1
T1053

Discovery

Network Service Discovery

3
T1046

System Information Discovery

2
T1082

Tasks