Resubmissions
10-09-2024 14:18
240910-rmqlgayflc 10General
-
Target
Hollow.nova7.4.exe
-
Size
18.4MB
-
Sample
240910-rmqlgayflc
-
MD5
0eccd228c2645b50e28cc82d81d59fbd
-
SHA1
81f33dad7cf167c36630da3f4ba249f482523fb4
-
SHA256
a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89
-
SHA512
d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3
-
SSDEEP
393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr
Behavioral task
behavioral1
Sample
Hollow.nova7.4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hollow.nova7.4.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Hollow.nova7.4.exe
-
Size
18.4MB
-
MD5
0eccd228c2645b50e28cc82d81d59fbd
-
SHA1
81f33dad7cf167c36630da3f4ba249f482523fb4
-
SHA256
a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89
-
SHA512
d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3
-
SSDEEP
393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
0009fff420b6a8c3491c4a5e86aedb14
-
SHA1
930c1697b367bc1255af660e6c4d8c55997bc474
-
SHA256
e9cfb73d310e54180b8267f2ef656428d093ca7bc78a782a42a7d4e37ac69e7f
-
SHA512
0dc848b794e0e2aba732792b02ff7e6150dadd09721500649908bf6721de54650514aca9f41b56bbcc248f4f5fb2fedb8706b8baab767f3cee29b492394ea30b
-
SSDEEP
192:w5RC50XP28D89qVtaZWdXwa1fb6qU+VWXEJhwmQhfNFTMdwu+Anw:N0XPsKSWusfGqYY27NFTPuHw
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1