General
-
Target
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5
-
Size
3.3MB
-
Sample
240807-wkb3hs1fpr
-
MD5
20682c5671ee69175bbbdc844db96934
-
SHA1
3d0d6845c66e39056c7f4c8009d4fb957c5d2cb3
-
SHA256
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5
-
SHA512
82431f567f0d2dcbd96ddbebfa6c098481e643e4fcf2bf9122f167233de3955e677ba55c8634b5728476f50d1056ea90ec2f290a03667720f16fe5ce70916d4a
-
SSDEEP
49152:qQtQRTMYIMi7ztfDyw20xoxJI/LfL8vh3UT/yxfBtVp/0RwEV0gcijtI9uv+i3cb:jtQRjdihmwVxz4JkT/ytSwi0gJ53+v5
Static task
static1
Behavioral task
behavioral1
Sample
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5
-
Size
3.3MB
-
MD5
20682c5671ee69175bbbdc844db96934
-
SHA1
3d0d6845c66e39056c7f4c8009d4fb957c5d2cb3
-
SHA256
eb6bf78a0a00e58d4e222a2d4979bbf1fdbf051e4a51bea06a1d8a8f5a08f2c5
-
SHA512
82431f567f0d2dcbd96ddbebfa6c098481e643e4fcf2bf9122f167233de3955e677ba55c8634b5728476f50d1056ea90ec2f290a03667720f16fe5ce70916d4a
-
SSDEEP
49152:qQtQRTMYIMi7ztfDyw20xoxJI/LfL8vh3UT/yxfBtVp/0RwEV0gcijtI9uv+i3cb:jtQRjdihmwVxz4JkT/ytSwi0gJ53+v5
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Drops startup file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-