General
-
Target
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890
-
Size
1.3MB
-
Sample
231114-xvc81aee94
-
MD5
3abcd9dbaca01dcae09569ec7c683542
-
SHA1
4bf7aaa067bece0b0d100a12060296962e91a7fe
-
SHA256
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890
-
SHA512
7b85b1125905eef426c81e1471865af0d37bc36450147ed45dae6fc2a6278602db212a14baa9e3b3d0958c63ed147bcd95dcd8cc950a8ed907f780c86edeb716
-
SSDEEP
24576:DrsYD6+IeW9/4G4QZw//e26fpruGILBVRTwwp+K556h8ZxGZl1MCamBVRTwwpq:cG6+Ip934iqBVRTwwp+456kily3mBVR0
Static task
static1
Behavioral task
behavioral1
Sample
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890.exe
Resource
win10v2004-20231020-en
Malware Config
Targets
-
-
Target
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890
-
Size
1.3MB
-
MD5
3abcd9dbaca01dcae09569ec7c683542
-
SHA1
4bf7aaa067bece0b0d100a12060296962e91a7fe
-
SHA256
4ae26fb45091aa7df4f1fee978d786b5534ce6d1d4b2045f1eed94418918c890
-
SHA512
7b85b1125905eef426c81e1471865af0d37bc36450147ed45dae6fc2a6278602db212a14baa9e3b3d0958c63ed147bcd95dcd8cc950a8ed907f780c86edeb716
-
SSDEEP
24576:DrsYD6+IeW9/4G4QZw//e26fpruGILBVRTwwp+K556h8ZxGZl1MCamBVRTwwpq:cG6+Ip934iqBVRTwwp+456kily3mBVR0
Score8/10-
Modifies Installed Components in the registry
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Defense Evasion
Modify Registry
5Subvert Trust Controls
1Install Root Certificate
1