General
-
Target
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93
-
Size
239KB
-
Sample
240921-bv78gsyepe
-
MD5
58a5c8b03f4f14c3fdfeb1e73cf72ac8
-
SHA1
fd35c9c55012cc6871812cc985dbdb436ccb0fac
-
SHA256
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93
-
SHA512
3e18a44e6c113d8f7c975bae6b57137524c15ebe802462c8be8da94b917341fdb4654aa51d9f5846978e827ace1ed521b1da6a33f1200c203e4ac1f9e4cec639
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pU3
Static task
static1
Behavioral task
behavioral1
Sample
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93
-
Size
239KB
-
MD5
58a5c8b03f4f14c3fdfeb1e73cf72ac8
-
SHA1
fd35c9c55012cc6871812cc985dbdb436ccb0fac
-
SHA256
4ef702a13b87f44dcdc149ba50fc0a334192c57018ccc1d846d19d8c4646fc93
-
SHA512
3e18a44e6c113d8f7c975bae6b57137524c15ebe802462c8be8da94b917341fdb4654aa51d9f5846978e827ace1ed521b1da6a33f1200c203e4ac1f9e4cec639
-
SSDEEP
3072:hsXRmUIMitiMQose27vc+Eld+xZp2vPRL1tT06zJoxAWBcKpSP//dwR1l9B4hT5:GR5IuMQoseGk7RZBGxAycKpSPX2pU3
-
Modifies WinLogon for persistence
-
Modifies visiblity of hidden/system files in Explorer
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1