General
-
Target
49783acdb261c20342650c50de66e30d.zip
-
Size
139KB
-
Sample
240901-dpr1eszelm
-
MD5
242d8e0890d359e039848ae73aa753f2
-
SHA1
fca35c31102b652633e515cdc6d90c5ac0ac3482
-
SHA256
9f724731fd6bb797a62bec03eb332badacfa9ea2313d4a62446cc1679d2e4505
-
SHA512
237f49321864172ec0dbdd51eb99ccc4bfca93d2cff7d7f5db0a0e7d748b6f10813b9b2cb6132d01e85548cebdb66e92c4fba1ff567352abf363579a26be72b1
-
SSDEEP
3072:yZdWGRvKExkaqXJDeQabR1do7f/6pp/LcLrz6mGoKGi1PdU:0dDSExXqtrmjo7K7yudU
Static task
static1
Behavioral task
behavioral1
Sample
12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3
-
Size
223KB
-
MD5
49783acdb261c20342650c50de66e30d
-
SHA1
7b2e63cd2485e25d3795a662a914e6460b0c9d1e
-
SHA256
12bb25ef1a2b4e1b253809de0b4f34262e3520b381048fc8e15c46e864aec8b3
-
SHA512
ed2a5730603894083070636ad3d2399e221f3ef970422d7a25416ab7857dc02556e5fde0080a698a4d1b51eef9f9ae0af8c2bcc5920999b1f3b0d340a21d8eca
-
SSDEEP
3072:YsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwRmxa:ZR5IuMQoseGk7RZBGxAycKpSPX2wa
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1