General
-
Target
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a
-
Size
239KB
-
Sample
240920-ykr5vavdkj
-
MD5
3a28c8e2aa4546bc7a113ec02b5811ae
-
SHA1
bdcefe00e4af5dae38119b67a758d2abb2c775b2
-
SHA256
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a
-
SHA512
d982691bb0d209252bf8aa43707b9bcb09166ff8d3e71af04fe7f19775e5f58f5587a03341098d21d2235498b6a2db6da93c9b52ae2a36f032388d78066ad420
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pUr
Static task
static1
Behavioral task
behavioral1
Sample
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a
-
Size
239KB
-
MD5
3a28c8e2aa4546bc7a113ec02b5811ae
-
SHA1
bdcefe00e4af5dae38119b67a758d2abb2c775b2
-
SHA256
050b32129f59d723930d690463cd24921effaf84a5f673e78f9de2282feb474a
-
SHA512
d982691bb0d209252bf8aa43707b9bcb09166ff8d3e71af04fe7f19775e5f58f5587a03341098d21d2235498b6a2db6da93c9b52ae2a36f032388d78066ad420
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pUr
-
Modifies visiblity of hidden/system files in Explorer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1