General
-
Target
Shark Predictor.rar
-
Size
17.7MB
-
Sample
240722-trpabaxakk
-
MD5
9cb82bc05579d8e047d2187fe3926839
-
SHA1
df043b623097629580ae8c9df68c17e4664f9152
-
SHA256
d2ab792a87f650bb12c89d42531762ccbed4abdccc29aae2aa0cf81c98885878
-
SHA512
f14bb27913a39fa88fed09aea84c358b98660e4cfb805a15917e1d398308b05b1b1687325a135d49cf1f67e494d49e5aad21762fb623241639f83e58cbe7f420
-
SSDEEP
393216:Qx9ejTA7iTh8soxWIxv8C0GgTRW1BIcmtdSY8EE/BRAoNlX9jMLFkd4XZ:QxgTAshVoxWIWggtW1BIcmtdV8EEBRAJ
Static task
static1
Behavioral task
behavioral1
Sample
Shark Predictor.rar
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Shark Predictor.rar
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Shark Predictor/Read.txt
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Shark Predictor/Read.txt
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Shark Predictor/Shark Predictor.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Shark Predictor/Shark Predictor.exe
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
Shark Predictor.rar
-
Size
17.7MB
-
MD5
9cb82bc05579d8e047d2187fe3926839
-
SHA1
df043b623097629580ae8c9df68c17e4664f9152
-
SHA256
d2ab792a87f650bb12c89d42531762ccbed4abdccc29aae2aa0cf81c98885878
-
SHA512
f14bb27913a39fa88fed09aea84c358b98660e4cfb805a15917e1d398308b05b1b1687325a135d49cf1f67e494d49e5aad21762fb623241639f83e58cbe7f420
-
SSDEEP
393216:Qx9ejTA7iTh8soxWIxv8C0GgTRW1BIcmtdSY8EE/BRAoNlX9jMLFkd4XZ:QxgTAshVoxWIWggtW1BIcmtdV8EEBRAJ
Score3/10 -
-
-
Target
Shark Predictor/Read.txt
-
Size
286B
-
MD5
dd50cac1427727182147c9d18864b235
-
SHA1
9bcf809847543cbdf5a102ca4a9919f9a891ca52
-
SHA256
3eb169de4a61a8ebef5b20be0926e5f7c58ee743a3be81673553784f5310d8a9
-
SHA512
b9b03f217078d1a95ff7a7ebbd424340c4c45506d76b0dcc758f6081ecb6156d8af02bd0d716c409835ef071898108dd6d713e7e8bfe69ad215dbc7292c4fdd4
Score1/10 -
-
-
Target
Shark Predictor/Shark Predictor.exe
-
Size
17.8MB
-
MD5
241211133c03a0a9555ca91b5da47fec
-
SHA1
6589e56c563b335186d1e0717dca432eb664391f
-
SHA256
372ea9ae9e5acf24a31fea3cfa936b6197c1277624043764fffe1e00d0d94609
-
SHA512
06ec337fa331022285b8fca7a93d135f752e4d07a7793cd9b6e799475eccf992b0610326173f7588ec728b28ee455f6b5a05e0cbc52974e605b44b1118e30f6e
-
SSDEEP
393216:0KF+JuCwCRDP8ihyvLiXYCSaXzDWoRDLDyBC1hIHkpyiASnG3YlwZQ:/+JhnDBzoOHDiiA5I
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1