General
-
Target
Celex_Cracked_by_sin.exe
-
Size
17.8MB
-
Sample
240921-xgb4saxgqn
-
MD5
d6c5f0bef19635e8e60437af069079e0
-
SHA1
1a667cb9428db2f7ca2f97f4f7e3262d61749fd2
-
SHA256
767e48ef37d3b055bd703c26399eb528543bcaad8ee69edf9bfcdcba783c7130
-
SHA512
69e37cb355704d216ea005b071a2308902989b59a1c225bb41b294043d3d336feb8b26fe9a84d0219cfd888788f19db9be7d96e8484da1373fc8feb238377d30
-
SSDEEP
393216:xqPnLFXlreQ+DOETgsvfG7MgpVsScvE/4M8O1Gd3q:YPLFXNeQ/EvCyoANO1v
Behavioral task
behavioral1
Sample
Celex_Cracked_by_sin.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Celex_Cracked_by_sin.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Celex_Cracked_by_sin.exe
-
Size
17.8MB
-
MD5
d6c5f0bef19635e8e60437af069079e0
-
SHA1
1a667cb9428db2f7ca2f97f4f7e3262d61749fd2
-
SHA256
767e48ef37d3b055bd703c26399eb528543bcaad8ee69edf9bfcdcba783c7130
-
SHA512
69e37cb355704d216ea005b071a2308902989b59a1c225bb41b294043d3d336feb8b26fe9a84d0219cfd888788f19db9be7d96e8484da1373fc8feb238377d30
-
SSDEEP
393216:xqPnLFXlreQ+DOETgsvfG7MgpVsScvE/4M8O1Gd3q:YPLFXNeQ/EvCyoANO1v
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
4934444de061e8d8f749339a1cab3ba5
-
SHA1
1f30917ed453705193d762eca7a900a08b1a00b5
-
SHA256
232d77a3ec1adcfd50d0e8be304d60b973d255fa241d89ed24ab2d25af1971aa
-
SHA512
3b212c17ecb453bfbfcd3054168e5a8717289699a34dfa061db3a39184668d2620d9e270756f8c90de0412267b19812d77d294bb83b115a55c04fa5d7c9e0e81
-
SSDEEP
192:w2z2he6JcD8kTzWdXwED/gd4kTpJhwtoBUMdwAj4nw:72hl0XWuY4D2toeP84w
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1