General
-
Target
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf
-
Size
239KB
-
Sample
240920-ygny1svbpj
-
MD5
801703cab4bc085aec4abda3595f4d40
-
SHA1
7d9db01a7825971de68c64d9cc45e46ba10c85e4
-
SHA256
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf
-
SHA512
0be1c562dbc2ba930f56341c3f1f6f7db1f0029735cc79719fdbea84cb1afda15f62c49829a96113b0d099320b593de02d022afb0cc6d1cf782333909aaba8a3
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hTu:GR5IuMQoseGk7RZBGxAycKpSPX2pUE
Static task
static1
Behavioral task
behavioral1
Sample
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf
-
Size
239KB
-
MD5
801703cab4bc085aec4abda3595f4d40
-
SHA1
7d9db01a7825971de68c64d9cc45e46ba10c85e4
-
SHA256
b7b573a5f6607dc3860aa12079e28e991a649396ecdc7ab7048f08ce45c92fbf
-
SHA512
0be1c562dbc2ba930f56341c3f1f6f7db1f0029735cc79719fdbea84cb1afda15f62c49829a96113b0d099320b593de02d022afb0cc6d1cf782333909aaba8a3
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hTu:GR5IuMQoseGk7RZBGxAycKpSPX2pUE
-
Modifies visiblity of hidden/system files in Explorer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1