General
-
Target
VoicemodSetup_2.48.0.0.exe
-
Size
112.2MB
-
Sample
240313-ahhavsgh67
-
MD5
91b98d97343351e879ef8304798864c0
-
SHA1
fba2e0c8229165d7f0cc34930ea96a2430d30ee6
-
SHA256
3671fd712335ef0d15e4d553edf19116f56d2ca18ede39d9d43536ce9e0bf2f4
-
SHA512
2a9a855d6a955c4bce3f4c23644cdb5d4454cb6e38b83ed5a42c9cf058e48584b762586415014a919d5567544ce570d99771a2258ef20c230a230bfc46c13fa8
-
SSDEEP
3145728:tYegNHiVdYZxPKyZ+DXfCJSQYBvvisu9koMvqSs:3gliV4z+bEzoviOv+
Static task
static1
Behavioral task
behavioral1
Sample
VoicemodSetup_2.48.0.0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VoicemodSetup_2.48.0.0.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://193.143.1.226
-
url_path
/129edec4272dc2c8.php
Extracted
icedid
4165079571
podiumstrtss.com
Extracted
risepro
193.233.132.62
193.233.132.62:50500
Extracted
amadey
4.18
http://193.233.132.56
-
install_dir
09fd851a4f
-
install_file
explorha.exe
-
strings_key
443351145ece4966ded809641c77cfa8
-
url_paths
/Pneh2sXQk0/index.php
Targets
-
-
Target
VoicemodSetup_2.48.0.0.exe
-
Size
112.2MB
-
MD5
91b98d97343351e879ef8304798864c0
-
SHA1
fba2e0c8229165d7f0cc34930ea96a2430d30ee6
-
SHA256
3671fd712335ef0d15e4d553edf19116f56d2ca18ede39d9d43536ce9e0bf2f4
-
SHA512
2a9a855d6a955c4bce3f4c23644cdb5d4454cb6e38b83ed5a42c9cf058e48584b762586415014a919d5567544ce570d99771a2258ef20c230a230bfc46c13fa8
-
SSDEEP
3145728:tYegNHiVdYZxPKyZ+DXfCJSQYBvvisu9koMvqSs:3gliV4z+bEzoviOv+
-
Creates new service(s)
-
Stops running service(s)
-
Downloads MZ/PE file
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies Windows Firewall
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1