General
-
Target
alexhormo.exe
-
Size
9.3MB
-
Sample
240709-e227lawdkp
-
MD5
4f6dce2684287ad39fa362658ff36014
-
SHA1
5e47f1cbb7f1c7589f815619dad067a24c3978f5
-
SHA256
e203084389ff90478995eb4bfe9ca60140552cfb3c8a7a8f077c2666d70f3d85
-
SHA512
aeda555070c4226249f73a3be4236ed190859112bb8b9ba79bb3dda982e0a9cdea353f3a0c929902821771e337dfd513f2388a13e1d7d771586e4a82d8c39a7b
-
SSDEEP
98304:FS+tg/BozXxWs0XHvLHMx3TNME1eCFayKyY90xfm:u/BozXezHMx3Tz1eCFayNxm
Behavioral task
behavioral1
Sample
alexhormo.exe
Resource
win11-20240704-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1260085000561233961/nowaEe0TuifKRBz7LZ7dCEaNJ-U_PTabT71pVG32SFyWEekIutPvLnyoXXA3znw4NKK2
Targets
-
-
Target
alexhormo.exe
-
Size
9.3MB
-
MD5
4f6dce2684287ad39fa362658ff36014
-
SHA1
5e47f1cbb7f1c7589f815619dad067a24c3978f5
-
SHA256
e203084389ff90478995eb4bfe9ca60140552cfb3c8a7a8f077c2666d70f3d85
-
SHA512
aeda555070c4226249f73a3be4236ed190859112bb8b9ba79bb3dda982e0a9cdea353f3a0c929902821771e337dfd513f2388a13e1d7d771586e4a82d8c39a7b
-
SSDEEP
98304:FS+tg/BozXxWs0XHvLHMx3TNME1eCFayKyY90xfm:u/BozXezHMx3Tz1eCFayNxm
-
Drops file in Drivers directory
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1