General
-
Target
synthize.exe.exe
-
Size
17.8MB
-
Sample
240920-ysdx7avgnm
-
MD5
df030cc1f1f8b86e1168bed2426b6bf3
-
SHA1
d1f2370064252101bb0268767ca7ad57290449f6
-
SHA256
a151055b7d82b322597d3d9aa5a21636c64bc075c563c202d66d0e5c14e26ec2
-
SHA512
6190c1f52abe918d0937ae44b07dab586e5d5023b6f272279241cbe79204c679289895f9ca50bb11c656475d7e4dd625485cd35d0c03fa05d38640c89f0ba482
-
SSDEEP
393216:JqPnLFXlreQ+DOETgsvfGCgn8FvEzb1ObJO1q:APLFXNeQ/EhO86NOcg
Behavioral task
behavioral1
Sample
synthize.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
synthize.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
synthize.exe.exe
-
Size
17.8MB
-
MD5
df030cc1f1f8b86e1168bed2426b6bf3
-
SHA1
d1f2370064252101bb0268767ca7ad57290449f6
-
SHA256
a151055b7d82b322597d3d9aa5a21636c64bc075c563c202d66d0e5c14e26ec2
-
SHA512
6190c1f52abe918d0937ae44b07dab586e5d5023b6f272279241cbe79204c679289895f9ca50bb11c656475d7e4dd625485cd35d0c03fa05d38640c89f0ba482
-
SSDEEP
393216:JqPnLFXlreQ+DOETgsvfGCgn8FvEzb1ObJO1q:APLFXNeQ/EhO86NOcg
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
c58db1b2e2c6e1422105aca6861d0baf
-
SHA1
061c01e87da7471b18dc0f8f7ac0e6f7db9efb8e
-
SHA256
d5fb56c40678966ba74a77f9f99023f3d4199d3b8f503c94bac600d784678ca2
-
SHA512
d4f789892740c6166c65864a60b6c534f8fa2a907be3b6f60bf62092df2ce1795dd009e1de89fde545f26318b55dfaffa37819efd606624edac869fd4c0da106
-
SSDEEP
192:wGxs5q/6D8qxXbWdXwvCGeofdz0kqnqJhwCCZLMdw5nw:Z4bWuXeofdwTO2CCZLP5w
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1