Overview
overview
10Static
static
10utopiaclient-main.zip
windows7-x64
1utopiaclient-main.zip
windows10-2004-x64
1utopiaclie...AR.txt
windows7-x64
1utopiaclie...AR.txt
windows10-2004-x64
1utopiaclie...ME.txt
windows7-x64
1utopiaclie...ME.txt
windows10-2004-x64
1utopiaclie...cc.txt
windows7-x64
1utopiaclie...cc.txt
windows10-2004-x64
1utopiaclie...am.txt
windows7-x64
1utopiaclie...am.txt
windows10-2004-x64
1utopiaclie...ds.txt
windows7-x64
1utopiaclie...ds.txt
windows10-2004-x64
1utopiaclie...nt.exe
windows7-x64
7utopiaclie...nt.exe
windows10-2004-x64
9main.pyc
windows7-x64
3main.pyc
windows10-2004-x64
3General
-
Target
utopiaclient-main.zip
-
Size
18.7MB
-
Sample
240815-fvfwfswemd
-
MD5
82bb2f5378d4faec462c3ef5bd531548
-
SHA1
80287a1a17eb4d1e3658e309e767e83d33c9b36f
-
SHA256
fbfa276166fdb9cacadbc96ac83aefa8a6d2a170e47d9fe5bb66a8345b76e316
-
SHA512
d14b80677f6c218dec61ab3743a5a98923082a3e84bd82124c11c642953e22e257d42f7d41449d70e78ca290e07564944736f5b1f900adf06126c4ae162a9aed
-
SSDEEP
393216:+DofJHb9LhFXufGdzncep+CvvYQ+mYTdNqEwFiRFF+BEFeH:vfBb99FXufGiUcjmGFsnH
Behavioral task
behavioral1
Sample
utopiaclient-main.zip
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
utopiaclient-main.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
utopiaclient-main/AR.txt
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
utopiaclient-main/AR.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
utopiaclient-main/README.txt
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
utopiaclient-main/README.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
utopiaclient-main/gcc.txt
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
utopiaclient-main/gcc.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
utopiaclient-main/spam.txt
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
utopiaclient-main/spam.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
utopiaclient-main/userids.txt
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
utopiaclient-main/userids.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
utopiaclient-main/utopiaclient.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
utopiaclient-main/utopiaclient.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
main.pyc
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
main.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
utopiaclient-main.zip
-
Size
18.7MB
-
MD5
82bb2f5378d4faec462c3ef5bd531548
-
SHA1
80287a1a17eb4d1e3658e309e767e83d33c9b36f
-
SHA256
fbfa276166fdb9cacadbc96ac83aefa8a6d2a170e47d9fe5bb66a8345b76e316
-
SHA512
d14b80677f6c218dec61ab3743a5a98923082a3e84bd82124c11c642953e22e257d42f7d41449d70e78ca290e07564944736f5b1f900adf06126c4ae162a9aed
-
SSDEEP
393216:+DofJHb9LhFXufGdzncep+CvvYQ+mYTdNqEwFiRFF+BEFeH:vfBb99FXufGiUcjmGFsnH
Score1/10 -
-
-
Target
utopiaclient-main/AR.txt
-
Size
432B
-
MD5
27374124d51e427592349be5e134bdf7
-
SHA1
5098321829550160a64742e0ddbceb9cd54efb2f
-
SHA256
bdc655f643d9720dccb09507974fe10233e78b4129229c97ebd1e3e1145429fa
-
SHA512
e4bb84dad6874769b24b8c088192c56f943886b2cc0711502cbefcfe24289ae369104d937413413365e0234a9e79edde4bcd7e7198cced4c3f107b36762f6cdd
Score1/10 -
-
-
Target
utopiaclient-main/README.txt
-
Size
2KB
-
MD5
d3aaaac3f1d8ec7400fe7e287dd153bb
-
SHA1
dc9c94f78a564a89367b3d8c99b7fec3a409c2e1
-
SHA256
a6e40ba88f65cb0aa1d7f87f93f18edd225dee9d860ec5d0fbaca08ba130bc03
-
SHA512
df3bc17e991a2da7b665c4f8d4887205b134099b002f7864327421d25fa88438f13486a9bfb5c03caf096a3dc0bd0367435b5c293aaf7289a6941208ce9aae61
Score1/10 -
-
-
Target
utopiaclient-main/gcc.txt
-
Size
22B
-
MD5
75003c838a80a4f6be5248f8cf14f52f
-
SHA1
865d339e48ff01a3b30871c74069511334431caa
-
SHA256
35af8abfb04068e434cf6277463557b9cd5d430fb063450ed74631e94d3edf71
-
SHA512
7f91b2098b5f9de15e3156eb8beb137be851cd25fc9ee42349af37bb4ce19a666099b25f923eb0ebec63826638f80356a22c2417d8572b5c987d954a87764af4
Score1/10 -
-
-
Target
utopiaclient-main/spam.txt
-
Size
362B
-
MD5
e2ad530ee1bc7f3c7d4fba5a3940c43c
-
SHA1
a0434d08cd68e89f101a97a0d5ebb18a637968e7
-
SHA256
e4f31c62cf0f228eab914769d4413dd6c9e734397fe5458455ff5504c21c805c
-
SHA512
36a631b0ef1e1f9572f97f6dfb2ab367ff6f0b482c85500d3a59495194da791bcf98cd415e874d96d43678094dee8f52bf6c3ec0dca167f6449a3e300decb3df
Score1/10 -
-
-
Target
utopiaclient-main/userids.txt
-
Size
19B
-
MD5
20db0ff1a5a17d35e0f41032c7ff3e04
-
SHA1
dda369616a2c1607b106d8a436353d8eb3aae28f
-
SHA256
3e7f05cb6db2dfd513f571a2143c533200464f2f324435128c6b0609151d70af
-
SHA512
339802ea5938af0f8ecd58833227b3e1ba0c52b50f40cfb53e304e07d97cdee26faa88a884555682895d556dc2b35ad1e43000df1e208b2d7b6737860c4968a6
Score1/10 -
-
-
Target
utopiaclient-main/utopiaclient.exe
-
Size
18.9MB
-
MD5
03472cdaccde61c4c0f24762ed3e4fbe
-
SHA1
bbed6a2d3c94d7343813154e9e9426d584b330b9
-
SHA256
ede680265619987f27b3a8a9da36c79546d45e440045d9a5fd89fb85ee74eef4
-
SHA512
731d2e5823dfaf10a1cc348c5e1b55299c9d07198545eb19370d2d195042e96c2e8565e1e75c07574aef9bd7279b7ca81a776916ed2a3c1b9d4b0d83347ad778
-
SSDEEP
393216:vqPnLFXlrFrQ8DOETgsvfGF9gru1fvE4VRfjPG7yPm:CPLFXNFrQhEIUB6frG5
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
f21ebb28620e7b90532854f8bf322a5f
-
SHA1
0d2813510f69ca5a209538ce2101861bb6086e85
-
SHA256
9eed4d3a6fda183d4123ffa45d653f05f230096d257e6824f639d72c491c5554
-
SHA512
16e35c90b3e86ace50edc84caf22b246e505a02a446678c4362403d32d75c2fdb11632033873c9fc26a827e7e45bf93ff12db510d27db4114728bf11d72b5b1a
-
SSDEEP
192:wBmeDHmCD8Ei4cAWdXwwqdcl4laDKJhwTuzMdwqnw:YmeDmoNZWuP2u2SzPqw
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1