General
-
Target
Dump.exe
-
Size
8.1MB
-
Sample
240823-h9h1ga1gma
-
MD5
831d0d7211dd1709d2f73500a1db7d41
-
SHA1
c001bac946bddd30da8940c4b8c2134215cfd07f
-
SHA256
ef96103782ed9d4f5a1b179f7a6d87c3baf8d9f58d81e6be4783e2680fe9b4ac
-
SHA512
072fb761f2d030049a8365e34163cdc24b3c0c9f5f6b29eed0c17e98c5f98b39a4a45eaa486a1ecccb59e22e1eed79bbad8bc7668e5dd0503abdd6dfd2e5bae7
-
SSDEEP
196608:vPafMj8SEeNQ9iBq5qlpUK7xefkTPCLn+:3afe7p6K7xefkGLn
Behavioral task
behavioral1
Sample
Dump.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Dump.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
stub-o.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
stub-o.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Dump.exe
-
Size
8.1MB
-
MD5
831d0d7211dd1709d2f73500a1db7d41
-
SHA1
c001bac946bddd30da8940c4b8c2134215cfd07f
-
SHA256
ef96103782ed9d4f5a1b179f7a6d87c3baf8d9f58d81e6be4783e2680fe9b4ac
-
SHA512
072fb761f2d030049a8365e34163cdc24b3c0c9f5f6b29eed0c17e98c5f98b39a4a45eaa486a1ecccb59e22e1eed79bbad8bc7668e5dd0503abdd6dfd2e5bae7
-
SSDEEP
196608:vPafMj8SEeNQ9iBq5qlpUK7xefkTPCLn+:3afe7p6K7xefkGLn
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
stub-o.pyc
-
Size
78KB
-
MD5
9c4cd7e9125ece9d59b6c10aa0967d91
-
SHA1
ab575a7a48341cd130d8650d8af833b8fdb2daef
-
SHA256
46ce91a2ddb5cbe5ef7b08fa767407d6659bdd864b5a9db0efd67f7dbb019e65
-
SHA512
1497dc728e697e7482a20ceb56aeb37bfc72a10f333517c07f00d6c623f9d7d8f344ab088c42c3f3422917c712cd9c635a93c6f657da7e640ab9636cdc1b6589
-
SSDEEP
1536:t9MWGguFI6hBlH1Y9gCI0PJfuXFG42BjVcK+NOvSbm3yvG7uW4xDlhLxtUSgeC:shI67lH2JmNhNzbm3yvG7B4BUaC
Score6/10-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1