General
-
Target
midnight and 420.rar
-
Size
42.7MB
-
Sample
240818-df1afavbrp
-
MD5
63005cb24c7ad7a1a57c645bd64b0615
-
SHA1
785e854991898148f2062aa6425f1e4d06f147eb
-
SHA256
bcbb5c397e12827f11b0536fd4bff37a1d6629242924b69c41868e8429860279
-
SHA512
bced4d9a1c732d6173cb54284c82675d81b346a7d1cdc7a140ef7af1094cae90da6bd39109ce6c69bf13b90a4a2e9a7c016df2dd794f043012f2037e5ead896c
-
SSDEEP
786432:89uI8A4EeeycuO54f+t5+1DAVDpON+9uI8A4EeeycuO54f+t5+1DAVDpONo:T7NyKmt5+1ewNt7NyKmt5+1ewNo
Behavioral task
behavioral1
Sample
420.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Midnight.exe
Resource
win10-20240611-en
Malware Config
Targets
-
-
Target
420.exe
-
Size
21.5MB
-
MD5
7082f7c7b7adf3f6bc825715ad3bd3fa
-
SHA1
aa22e15be3f04b820f75393e84c92709dda4e75f
-
SHA256
2929f4cd18312435d3d4198e2ac2961de365e036555020109a884822a9228fd5
-
SHA512
99083ab893273aceb6b015fffa4c89f9cfd770ffa0c626c16346290ee4b66248980a26a7a2671e6ecb6d7268de949b21afca7ebe0494892dae5afc66125114f9
-
SSDEEP
393216:aqPnLFXlr4ChH79E2FXQ8DOETgs77fG8KgjnFvE46i5Tk5zXYm:vPLFXN9brFQhE72c6KTk5x
Score7/10-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Midnight.exe
-
Size
21.5MB
-
MD5
7082f7c7b7adf3f6bc825715ad3bd3fa
-
SHA1
aa22e15be3f04b820f75393e84c92709dda4e75f
-
SHA256
2929f4cd18312435d3d4198e2ac2961de365e036555020109a884822a9228fd5
-
SHA512
99083ab893273aceb6b015fffa4c89f9cfd770ffa0c626c16346290ee4b66248980a26a7a2671e6ecb6d7268de949b21afca7ebe0494892dae5afc66125114f9
-
SSDEEP
393216:aqPnLFXlr4ChH79E2FXQ8DOETgs77fG8KgjnFvE46i5Tk5zXYm:vPLFXN9brFQhE72c6KTk5x
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1