General
-
Target
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac.zip
-
Size
931KB
-
Sample
240402-q7mvmscd93
-
MD5
8dd93f921eccf87e78ce9726fd313185
-
SHA1
b0cae0545abe796ec8c2c58cdaaeeddb70dc5813
-
SHA256
b1a7f6080be22ee997629f40065503419c579167dbcde70aa7a7854e8a5fea78
-
SHA512
1a247fccfb9ca84f2d24b48f7d2c528d0e6333f624b7050a08d92efcc247f3daed65c74a1e3db29fd7fe8aac81d50ba9607c914e57205ba1e1d512c46f755ceb
-
SSDEEP
24576:c1ZEJWn7dRNdzSNvJd37xDAEDWs2zUMDIMEBECACdXr:WZkAxMLkE72zUaEBESd7
Static task
static1
Behavioral task
behavioral1
Sample
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: ftp- Host:
ftp.lucd.ru - Port:
21 - Username:
[email protected] - Password:
doll@@2020
Targets
-
-
Target
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac.exe
-
Size
1.5MB
-
MD5
9ae482062c306491334cb178fe919a3e
-
SHA1
c2f76bc7512dfc45621fc7f23f8b2deb6c45f5f0
-
SHA256
1f998c6032159b469178389d2cc6debf14c810bd11b3be86a374ee7608d11cac
-
SHA512
8dcd3ad324ada81ac3c40618b3754aa850f9fbdd4ee26105a28bdd39b62ae0625688827eae5499de6358779f150c7c2f790a136d010b7d55169203253a81bddb
-
SSDEEP
24576:PXXQKVZnyHJ/mUgHrxpyUdjYxZi/nLzy+yNzbMCms016w33yd2OluON4fA9uCG:PHQ4nypujrxp5YxZ8LzlyZAd/L3yd2O8
-
Looks for VirtualBox Guest Additions in registry
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1