General
-
Target
sample
-
Size
13KB
-
Sample
240803-eyebcstamj
-
MD5
0399d4c80f1ca63f52f0e6453b8c292f
-
SHA1
2e521bdc0d1141ea25ac2bf436543d44abbc4e97
-
SHA256
c1c54e49305dd5fbdbd54b934e6089193059b27a2a9fd15a8bf37800db42da2b
-
SHA512
9afcb7ea30d173ef899fc23250ad7cc3f0a72ce33d41cbd9ebf3807182e8d410a81791d2ea96fdc043010b5901658543652f46dfaf2e1fa1b14c54c4d3a9e52e
-
SSDEEP
192:+33x3PU3PvKPl3PR5KYUXmY7J7bBSagVSO3Pq:63x3PU3PSPl3PWYmmY7ZyZ3Pq
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
sample
-
Size
13KB
-
MD5
0399d4c80f1ca63f52f0e6453b8c292f
-
SHA1
2e521bdc0d1141ea25ac2bf436543d44abbc4e97
-
SHA256
c1c54e49305dd5fbdbd54b934e6089193059b27a2a9fd15a8bf37800db42da2b
-
SHA512
9afcb7ea30d173ef899fc23250ad7cc3f0a72ce33d41cbd9ebf3807182e8d410a81791d2ea96fdc043010b5901658543652f46dfaf2e1fa1b14c54c4d3a9e52e
-
SSDEEP
192:+33x3PU3PvKPl3PR5KYUXmY7J7bBSagVSO3Pq:63x3PU3PSPl3PWYmmY7ZyZ3Pq
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
An obfuscated cmd.exe command-line is typically used to evade detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2