General
-
Target
wso6rghb.exe
-
Size
31.5MB
-
Sample
240622-zz4mvsvapb
-
MD5
44463a510f5c916dee00f95536f17c03
-
SHA1
4ea56721d3d3dfad48350f8dc0062a88933bfe26
-
SHA256
d53109ba9cd341b681f38af94dad53cebbb1aa8cfbe87252f37e51cceb0409c4
-
SHA512
70a9a806d51ecfe57d44b0fec766c1caa79921d81cf3a830e8beef340ce503d778608b82bcdfb17e83ae90334e222a4336ad913deed873ada3e789edb8d9bbac
-
SSDEEP
786432:L8DYYU85aXV48IX2fbXiuQd2xPEdW4KbmHf2etV:9YU85CxsKbXGuPEdW4vDV
Static task
static1
Behavioral task
behavioral1
Sample
wso6rghb.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
wso6rghb.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1254118767479230536/uMZWbLjVaGr8S-PRvi_Z47CPXEDiOJ-ssPsLmthPiK0slWmgI1yaAACp9fcD_soa2x8n
Targets
-
-
Target
wso6rghb.exe
-
Size
31.5MB
-
MD5
44463a510f5c916dee00f95536f17c03
-
SHA1
4ea56721d3d3dfad48350f8dc0062a88933bfe26
-
SHA256
d53109ba9cd341b681f38af94dad53cebbb1aa8cfbe87252f37e51cceb0409c4
-
SHA512
70a9a806d51ecfe57d44b0fec766c1caa79921d81cf3a830e8beef340ce503d778608b82bcdfb17e83ae90334e222a4336ad913deed873ada3e789edb8d9bbac
-
SSDEEP
786432:L8DYYU85aXV48IX2fbXiuQd2xPEdW4KbmHf2etV:9YU85CxsKbXGuPEdW4vDV
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Event Triggered Execution: Image File Execution Options Injection
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
3Disable or Modify Tools
3Modify Registry
7Subvert Trust Controls
1Install Root Certificate
1