General
-
Target
45871378c7a91318dfda953a8b4efbdb0e0d150a4f92c612f711aeb762e7c031
-
Size
19.7MB
-
Sample
240822-zrk6jsxdpe
-
MD5
fb0b39625bb59cd930069948dd20a43c
-
SHA1
30d8771889146ec6b48b90034097ae99b2b0f409
-
SHA256
45871378c7a91318dfda953a8b4efbdb0e0d150a4f92c612f711aeb762e7c031
-
SHA512
39e20b1aa8eae98935192c85b8cb0e899445df92909fd3cc0aa76c736307f1f68b5e5722c00eb4e8e65ea5f314027572b9bb66c0385895606a7c7309359e6681
-
SSDEEP
393216:kZaYTUkWVNcnZHYVmvYmDXaI9+0n9PH3q5MEhMmKRYcS+m7LsHCm3Ud3BncSzOeu:kZAkw48pmW0Xq5MYGAd7LseBnsaUz
Behavioral task
behavioral1
Sample
installpy3.8.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
installpy3.8.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
venz.xyz.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
venz.xyz.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
x.6xyyn.py
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
x.6xyyn.py
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
installpy3.8.bat
-
Size
47KB
-
MD5
18e17774097ec626ff846c22cd9840f9
-
SHA1
691856af491bc2a8e7399409e606f0f78730341b
-
SHA256
3653d2ad5e2d98f12ad4ea90c547d648d98f34da3b4936442b0dbc90f22b83c3
-
SHA512
881c2beaae0d16cff068b5c891041538c58be1a6d3fa5c6a35dede9579ea072f248942fb690ff3b8590bf3a392f28047226148e0a59fa99bf4d253511fa74a42
-
SSDEEP
768:y3/HEkYRHeLhcgbgm3vjM0kLicUyL6dylQLM+w48IL32eCpP71fAN4ylXV1ZCG2I:Gsuvg0QTXyAPKah7y8c0vJuQP1CJTqT8
Score1/10 -
-
-
Target
venz.xyz.exe
-
Size
19.9MB
-
MD5
ad62a53d7cf54f8058181587260b35c0
-
SHA1
70303dddd94910613576fb0c2347383b8b0803f4
-
SHA256
0c0f9dd5e376d642c0e8ba63af44676947c3a0bff5d5777ca3e4fb265adbf793
-
SHA512
514afb1fc59fa3dca02781fcab0a2428dd1acdb6d4128ef068763388436f16a87e27fa3d05f0b8e384b7e859957dff3a587dfed3dfd8b6d5ce2e5e2a9514f7ff
-
SSDEEP
393216:ouqPnLFXlrFhrQ6DOETgs77fGsgw/vO4xa1f3L4Sm:IPLFXNFNQrE7zvOXf3U
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
x.6xyyn.py
-
Size
428KB
-
MD5
b0db11ccf6cc25f90b6549b2ac8b4be6
-
SHA1
06505b3e55fea1b45b354ec254948917cc9b7f20
-
SHA256
ea144323b74c05280c4fa2032103775cfae4969f8b9b08b8c32d686f0f48b647
-
SHA512
cb73ff1a0f06d748c1ebc7e648b07cfdff7d89b8c40029625af88eef87ca3d7eb79176970404a8d6c35ccf9958cdc3fe4531fc75799408986b0bb294972cca16
-
SSDEEP
6144:Gsuvg0QTXyAPKah7y8c0vJuQP1CJTqTAHvYzIBTREvR8KCOum7k3muBRhRam7mYQ:L
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1