General
-
Target
maple.zip
-
Size
83.6MB
-
Sample
240719-bpflaayfrg
-
MD5
fd985adc8aaee167bef400190fa2c5d1
-
SHA1
b3939e083581c17d3b93b61f71b013b86d236d8b
-
SHA256
201b6477e5af17431d5e334948b9a59a9bbd26665ccf0a8e5f7da619a0fb12c9
-
SHA512
17d45f9aa9e0f8b29ae93aa9e0d6cefab286bc8a7d0fe5dae71910830b64adc5896c6cac30a3375c0e792e132fe6a355d186fc3cd5b7f6879966a8a6d311bb10
-
SSDEEP
1572864:YJ+CimF+lbq7Ybr/qraQcV0SmUFMUyIURt0t1zjkqsBTzQEx1Xgrp0iPOPncp0oJ:YJ+/mw9Q9PcaSk4UR25sBbx1XgjPOkXJ
Behavioral task
behavioral1
Sample
maple.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
maple/Maple.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
maple/loader.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendDocument?chat_id=-1002245526003&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/sendMessage?chat_id=-1002245526003
https://api.telegram.org/bot7258239318:AAE_J6DhWLSRk9YOV8l1ienRdy5HsJZuR6I/getUpdates?offset=-
Targets
-
-
Target
maple.zip
-
Size
83.6MB
-
MD5
fd985adc8aaee167bef400190fa2c5d1
-
SHA1
b3939e083581c17d3b93b61f71b013b86d236d8b
-
SHA256
201b6477e5af17431d5e334948b9a59a9bbd26665ccf0a8e5f7da619a0fb12c9
-
SHA512
17d45f9aa9e0f8b29ae93aa9e0d6cefab286bc8a7d0fe5dae71910830b64adc5896c6cac30a3375c0e792e132fe6a355d186fc3cd5b7f6879966a8a6d311bb10
-
SSDEEP
1572864:YJ+CimF+lbq7Ybr/qraQcV0SmUFMUyIURt0t1zjkqsBTzQEx1Xgrp0iPOPncp0oJ:YJ+/mw9Q9PcaSk4UR25sBbx1XgjPOkXJ
Score1/10 -
-
-
Target
maple/Maple.exe
-
Size
74.8MB
-
MD5
87dbbc1ff26b8f7e5cbe56b8f7d4d406
-
SHA1
c731816d542d527c25b0ce6269a573b8eb486e9b
-
SHA256
f7821841c7f10c253f9e34f91e38cea853244afc0103561647598c707ff26742
-
SHA512
2196b39219865c2efd75fa678b0e4723951a2a2f48094c410ddcff4b9ef59e35cb946788487130085f77826868abfe3e7c35cbb80389c3e4d59adedce860086c
-
SSDEEP
1572864:Aps9Fnab4+6DQSc6JUCSi0HTq1/3LmSGnxnkqbHbcT7IMpeQW/0FKAGCYK:wzx6cSgC0HMVGnDbHbc5peu9GCYK
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
-
-
Target
maple/loader.exe
-
Size
5.3MB
-
MD5
e630d72436e3dc1be7763de7f75b7adf
-
SHA1
40e07b22ab8b69e6827f90e20aeac35757899a23
-
SHA256
59818142f41895d3cadf7bee0124b392af3473060f00b9548daa3a224223993e
-
SHA512
82f0be15e2736447fae7d9a313a8a81a2c6e6ca617539ff8bf3fa0d2fe93d96e68afea6964e96e9dd671ba4090ddbc8a759c9b68f10e24a7fb847fe2c9825a83
-
SSDEEP
98304:MY5XZjNqBeNp4iSgPKpQ9CKhqkaIWvO9SYCxBKXyaxVdb+tSVGHyYDMMl7qg7:MYpMeNp4irCmWISnTz2VtIVDMg7n7
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1