General
-
Target
main.exe
-
Size
17.8MB
-
Sample
240815-1accrazcqm
-
MD5
d2f1e43cf79329555884dbea81482cf3
-
SHA1
1b4ad4dd8a88013bb64121b5980573701c22eaa9
-
SHA256
59946d06786bfff6beac0e8e17976999fd55fc366a04adc82fa389aae363d96b
-
SHA512
7702bda9970c9246ebd797f5b97b9786b91242c2d21dcdd86b6ff379c56b79b058953ed96a2c710f7cdf6ad212db4c99a08793009db89df8e2aeb5ef380d7957
-
SSDEEP
393216:3qPnLFXlryQ8DOETgsvfGrgMHvEbLUoSW8Jzq:6PLFXNyQhEapsbCWN
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
17.8MB
-
MD5
d2f1e43cf79329555884dbea81482cf3
-
SHA1
1b4ad4dd8a88013bb64121b5980573701c22eaa9
-
SHA256
59946d06786bfff6beac0e8e17976999fd55fc366a04adc82fa389aae363d96b
-
SHA512
7702bda9970c9246ebd797f5b97b9786b91242c2d21dcdd86b6ff379c56b79b058953ed96a2c710f7cdf6ad212db4c99a08793009db89df8e2aeb5ef380d7957
-
SSDEEP
393216:3qPnLFXlryQ8DOETgsvfGrgMHvEbLUoSW8Jzq:6PLFXNyQhEapsbCWN
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
70f4b975b6907d127a78ee9a2cb6a651
-
SHA1
21cd5b8a21030cc5479196cb37103722ee4fda48
-
SHA256
3ce0af66cbf89801b2a829541d0f148da548703d3a82ebe96981a4630438ebac
-
SHA512
114687ef44c7954e1f00648305a0e4a69ad66328c556f6d9f765ccc4a2c3db40f881523e6ec829a94f3668cda8dc6c028af2af438feed1a71672ff65b0d2a59d
-
SSDEEP
192:wrTUYFIttKx1D8b0vWdXw7QEYvrkZVQJhweHrrMdwSwnw:uTUYFItMxEeWuEEOX2yPSww
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1