General
-
Target
main.exe
-
Size
18.6MB
-
Sample
240928-j9b3laybmc
-
MD5
9ba87fa5ed4b8db9d1baf3f041b77106
-
SHA1
1090cc1aae43f68660a40c12670376278ed05c85
-
SHA256
028a100c10821dd5a822609fc56c313c6e741551aebe60239ae0b12970acbd9b
-
SHA512
457665367bcbdfaaff600d8349a6a71131d38728f34722ab85b247e421a5c0a2cdb7ef024439a19119e4fae2afe07b62105ff242c82e7fa0430f71163c5fe3a3
-
SSDEEP
393216:ZqPnLFXlrNQ+DOETgs77fGUggIHvE7EzqOU0Zq:QPLFXNNQ/E7hjIs7VOy
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
18.6MB
-
MD5
9ba87fa5ed4b8db9d1baf3f041b77106
-
SHA1
1090cc1aae43f68660a40c12670376278ed05c85
-
SHA256
028a100c10821dd5a822609fc56c313c6e741551aebe60239ae0b12970acbd9b
-
SHA512
457665367bcbdfaaff600d8349a6a71131d38728f34722ab85b247e421a5c0a2cdb7ef024439a19119e4fae2afe07b62105ff242c82e7fa0430f71163c5fe3a3
-
SSDEEP
393216:ZqPnLFXlrNQ+DOETgs77fGUggIHvE7EzqOU0Zq:QPLFXNNQ/E7hjIs7VOy
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1