General
-
Target
ce46c599ce044629569bfaef9e1373fb452c128309cf1fd7aed4c6fc5235c7b5.zip
-
Size
971B
-
Sample
240730-c1h18axelb
-
MD5
e5259b6024621e100b418507ef79a7dd
-
SHA1
075f2357c9f138ec55aab39888be36aad3daef59
-
SHA256
ce46c599ce044629569bfaef9e1373fb452c128309cf1fd7aed4c6fc5235c7b5
-
SHA512
2761e44034ca223deb297985731e48aa2fbc311db97ff0ec4115526d08e323f59a89b673b9e1c493a9104b9095d901e2143bebaae52f610b8675421dffa462b7
Static task
static1
Behavioral task
behavioral1
Sample
Catalog co.pdf.lnk
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Catalog co.pdf.lnk
Resource
win10v2004-20240709-en
Malware Config
Extracted
gurcu
https://api.telegram.org/bot7304169973:AAHQ-YM-Iz4Z3iwfTDSixExgl7INL8UlSEA/sendMessage?chat_id=6845150313
Targets
-
-
Target
Catalog co.pdf.lnk
-
Size
2KB
-
MD5
eb248558c413ed59d5f85b05ecba8213
-
SHA1
67b895b8372810fc71e4bc4b645225adff29239b
-
SHA256
b9bb4eb13cb09c25862151e98059905804034304d4c65d9efe1f2ad0da38301a
-
SHA512
215e64935fc7fd4ed15b85b96cf98871bbdd4cfd07f3cefaf89e9374709137a6136793f49182a0dfa3717e5418a7ebac47890ed5fd248f511804a81ef1671697
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1