General
-
Target
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558
-
Size
2.3MB
-
Sample
240908-c3s9zasekc
-
MD5
886224a4982435e68ed383051e7afd54
-
SHA1
36f2a13cf3071f5076c199476933105c84a81b5d
-
SHA256
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558
-
SHA512
948009a8bb4f201f3bcd24d4ff4ceb4c0dd949644761eecf55cc159ea0e4bc6c374746212fc663822cf70c600ab2aa824a39500ab2d592e4997e672161c83b7d
-
SSDEEP
49152:zjDOf2mneHMMWOpUppDF7P45RpYQhItU7SaW9mE9XfYr5u7qLKvg:YesMWeIDhP2DYQMU7SaWRfYrD2Y
Static task
static1
Behavioral task
behavioral1
Sample
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558
-
Size
2.3MB
-
MD5
886224a4982435e68ed383051e7afd54
-
SHA1
36f2a13cf3071f5076c199476933105c84a81b5d
-
SHA256
075b787a1c1952697af1b747b896f2422ce61e3ec8f7a2ae39d380f652de3558
-
SHA512
948009a8bb4f201f3bcd24d4ff4ceb4c0dd949644761eecf55cc159ea0e4bc6c374746212fc663822cf70c600ab2aa824a39500ab2d592e4997e672161c83b7d
-
SSDEEP
49152:zjDOf2mneHMMWOpUppDF7P45RpYQhItU7SaW9mE9XfYr5u7qLKvg:YesMWeIDhP2DYQMU7SaWRfYrD2Y
-
Modifies security service
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Credentials from Password Stores: Windows Credential Manager
Suspicious access to Credentials History.
-
Deletes itself
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Credential Access
Credentials from Password Stores
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
2Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1