General
-
Target
main.exe
-
Size
20.7MB
-
Sample
240907-yndrma1hnn
-
MD5
bae090df96ad2bfeec28212f38e1e530
-
SHA1
d6518a42c96a989a924f4989b79e57a5f0133bab
-
SHA256
bbab45fc076d4140300918a083cc74f2e2786c6aa0fc4ee345ddccdad5425ed8
-
SHA512
6cb9f6ff828a77ed176473e9ebf2bc0c22bcca1725200811a3e83ba77fec20b85b1ca7d91f481f493e07ae6f0414f2b67a77923f49b49db1b49d66d8ea1d8cef
-
SSDEEP
393216:VqPnLFXlrfh2Jp5qC3njkVQ8DOETgsvfGzKgQxWtvE4kDCT2m:MPLFXNfh50sQhE1hICA
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
20.7MB
-
MD5
bae090df96ad2bfeec28212f38e1e530
-
SHA1
d6518a42c96a989a924f4989b79e57a5f0133bab
-
SHA256
bbab45fc076d4140300918a083cc74f2e2786c6aa0fc4ee345ddccdad5425ed8
-
SHA512
6cb9f6ff828a77ed176473e9ebf2bc0c22bcca1725200811a3e83ba77fec20b85b1ca7d91f481f493e07ae6f0414f2b67a77923f49b49db1b49d66d8ea1d8cef
-
SSDEEP
393216:VqPnLFXlrfh2Jp5qC3njkVQ8DOETgsvfGzKgQxWtvE4kDCT2m:MPLFXNfh50sQhE1hICA
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Accessibility Features
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1