General
-
Target
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef
-
Size
2.7MB
-
Sample
240821-tjt6laxhlb
-
MD5
5df4f8f8a7a896fad462276803c89857
-
SHA1
ab113df31bb37cdb727f3ea3c6e9cc397e5be80e
-
SHA256
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef
-
SHA512
08a63d53836e37a7971f76dc1e60be44ec073bdd11cbf3eb9f9dac9d1c8e1a4fa7a83c38dff972c8febad82f53b3c85f0db548664851fe7b5d60b05999ec13ee
-
SSDEEP
24576:aju8SpOfT+Z8fDTuvlzq3ae70J6ImfeSnPlAVMRNJhpEx4oQp3d2TX9iSghV+3Ol:NOfHfvu9qakj+aRXEx4LV+3OvS
Static task
static1
Behavioral task
behavioral1
Sample
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
bitrat
1.38
aaaxxx60.hopto.org:100
-
communication_password
827ccb0eea8a706c4c34a16891f84e7b
-
tor_process
tor
Targets
-
-
Target
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef
-
Size
2.7MB
-
MD5
5df4f8f8a7a896fad462276803c89857
-
SHA1
ab113df31bb37cdb727f3ea3c6e9cc397e5be80e
-
SHA256
1b57c846642439e8075b62c48f9f308c599c2fc0c028631b9263e6724c64ecef
-
SHA512
08a63d53836e37a7971f76dc1e60be44ec073bdd11cbf3eb9f9dac9d1c8e1a4fa7a83c38dff972c8febad82f53b3c85f0db548664851fe7b5d60b05999ec13ee
-
SSDEEP
24576:aju8SpOfT+Z8fDTuvlzq3ae70J6ImfeSnPlAVMRNJhpEx4oQp3d2TX9iSghV+3Ol:NOfHfvu9qakj+aRXEx4LV+3OvS
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1