General
-
Target
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f.exe
-
Size
2.3MB
-
Sample
240819-bq72xszbnl
-
MD5
8b4e3a62d01f4d0cf638607b5e7fb2a1
-
SHA1
7af22d0699c5d98422672b502e3bdfec4d67ce96
-
SHA256
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f
-
SHA512
d0d7279583395eeb463e80e5ad065d95898198d6901e7ae922b939e11276c9a86bd2c3aee67f62675e524509e56079c8a9628056a56054ddfb3a7211c3294d30
-
SSDEEP
49152:64ryFkp8Y4N1Pq3FKHv6T0x5E/aHJEt05iR:6qrpddVBTv
Static task
static1
Behavioral task
behavioral1
Sample
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f.exe
-
Size
2.3MB
-
MD5
8b4e3a62d01f4d0cf638607b5e7fb2a1
-
SHA1
7af22d0699c5d98422672b502e3bdfec4d67ce96
-
SHA256
4187407e94e390b8916206e2714b4941cacd06c60f9a8662f41b847cab5f2d5f
-
SHA512
d0d7279583395eeb463e80e5ad065d95898198d6901e7ae922b939e11276c9a86bd2c3aee67f62675e524509e56079c8a9628056a56054ddfb3a7211c3294d30
-
SSDEEP
49152:64ryFkp8Y4N1Pq3FKHv6T0x5E/aHJEt05iR:6qrpddVBTv
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1