General
-
Target
main.exe
-
Size
18.0MB
-
Sample
240927-dxaq4swaqc
-
MD5
b3d25be4fed9a006c0fdece5ab598efe
-
SHA1
ad7261e71cc38631bfc5ff8bd8586f6a859979be
-
SHA256
d9ef5ed91e6c17252fa4d698d91378ba39ba22f8c6dd821fd51cdcc46e7d55b2
-
SHA512
162d68b4ac9e93e5674dcfc90ec732e0b9947ca270ad14a9f7afb6f9ea14dfe38ef6a357993131e572be932e71f215a6b3b0b6c7af298d590257d552a001ba17
-
SSDEEP
393216:eqPnLFXlrFy1QpDOETgsvfG9ngV9LPvN6OTcH0:TPLFXNF4QoEyM9Rjc
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
18.0MB
-
MD5
b3d25be4fed9a006c0fdece5ab598efe
-
SHA1
ad7261e71cc38631bfc5ff8bd8586f6a859979be
-
SHA256
d9ef5ed91e6c17252fa4d698d91378ba39ba22f8c6dd821fd51cdcc46e7d55b2
-
SHA512
162d68b4ac9e93e5674dcfc90ec732e0b9947ca270ad14a9f7afb6f9ea14dfe38ef6a357993131e572be932e71f215a6b3b0b6c7af298d590257d552a001ba17
-
SSDEEP
393216:eqPnLFXlrFy1QpDOETgsvfG9ngV9LPvN6OTcH0:TPLFXNF4QoEyM9Rjc
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1