General
-
Target
Hollow.nova7.4.exe
-
Size
18.4MB
-
Sample
240910-rq6rvsyhka
-
MD5
0eccd228c2645b50e28cc82d81d59fbd
-
SHA1
81f33dad7cf167c36630da3f4ba249f482523fb4
-
SHA256
a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89
-
SHA512
d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3
-
SSDEEP
393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr
Behavioral task
behavioral1
Sample
Hollow.nova7.4.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Hollow.nova7.4.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Hollow.nova7.4.exe
-
Size
18.4MB
-
MD5
0eccd228c2645b50e28cc82d81d59fbd
-
SHA1
81f33dad7cf167c36630da3f4ba249f482523fb4
-
SHA256
a0109b2dbaa9d58fa022090d798d800fa5edbc429a04c10e83bd833890d4cb89
-
SHA512
d71faf3c32402756776361e01ef8f84c57e87c4a1845aec0cf67806be5ae520e1f0721e45925677beaba08c9138ac04aaeaca1e37d1b61ab59004b822e74a3e3
-
SSDEEP
393216:qqPnLFXlr9QpDOETgs77fGaQgzxTvEu4SVjNL6q:/PLFXN9QoE7gWicdxr
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1