General
-
Target
Sypr$Tool.exe
-
Size
18.7MB
-
Sample
240904-jz4d4ayanh
-
MD5
4e52de32664ce60619149f18feeef99d
-
SHA1
d86dd3a3c51eb638303eb1f2c9781b5a471a177c
-
SHA256
e2d7dea69bfde2dc6ab569b06838e24342bb3a6d5d0e6e1cba20c140ce987962
-
SHA512
16ff12cf4483e686a6a05d6ccb896f466aa1f1f7b5dfeb1d92e1393b6aa57967e6ff688481cba43fa569fc9dc7a3363005de8894f4a386df6a36c1ac3c69da80
-
SSDEEP
393216:qqPnLFXlrjQpDOETgsvfGPgvE1uTdDoigMX3lPC:/PLFXNjQoEK2E27tX
Behavioral task
behavioral1
Sample
Sypr$Tool.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Sypr$Tool.exe
-
Size
18.7MB
-
MD5
4e52de32664ce60619149f18feeef99d
-
SHA1
d86dd3a3c51eb638303eb1f2c9781b5a471a177c
-
SHA256
e2d7dea69bfde2dc6ab569b06838e24342bb3a6d5d0e6e1cba20c140ce987962
-
SHA512
16ff12cf4483e686a6a05d6ccb896f466aa1f1f7b5dfeb1d92e1393b6aa57967e6ff688481cba43fa569fc9dc7a3363005de8894f4a386df6a36c1ac3c69da80
-
SSDEEP
393216:qqPnLFXlrjQpDOETgsvfGPgvE1uTdDoigMX3lPC:/PLFXNjQoEK2E27tX
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1