General
-
Target
Setup.exe
-
Size
18.8MB
-
Sample
240925-zhd1wawhpp
-
MD5
a8a687806803236207190b8d2924c8e2
-
SHA1
4982051c289eb54e46d22013edf74b2c5f69933c
-
SHA256
3e4afcd4d33ed9295f63463bad1bfa73efad7e2440d25e0865c551ae7e47b74c
-
SHA512
84d5454e2808ae30d381e339eaa3148fc66c1bd41d98032f28fd13b1dc8b4b6ad5ea6ff2df47a4c9d3633ce4bb0d3f85316bee7a959d0536c96f884d6b4c31da
-
SSDEEP
393216:AqPnLFXlrLBQ+DOETgsvfG9CgdB9pvE4nJtfpyrm:BPLFXNLBQ/E5KBgetfj
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Setup.exe
-
Size
18.8MB
-
MD5
a8a687806803236207190b8d2924c8e2
-
SHA1
4982051c289eb54e46d22013edf74b2c5f69933c
-
SHA256
3e4afcd4d33ed9295f63463bad1bfa73efad7e2440d25e0865c551ae7e47b74c
-
SHA512
84d5454e2808ae30d381e339eaa3148fc66c1bd41d98032f28fd13b1dc8b4b6ad5ea6ff2df47a4c9d3633ce4bb0d3f85316bee7a959d0536c96f884d6b4c31da
-
SSDEEP
393216:AqPnLFXlrLBQ+DOETgsvfG9CgdB9pvE4nJtfpyrm:BPLFXNLBQ/E5KBgetfj
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1