General
-
Target
redirect
-
Size
6KB
-
Sample
240928-qxplgs1dqd
-
MD5
bd9e3fc472b9cfba5669f127d0bf9e5a
-
SHA1
b8e11d3a3278e0cc5ac14d77aad5689e2fa7ae48
-
SHA256
75667fda1b99708d9fa4ca8a7c9ea246fa2e2c8d27411d623a140e6cb25b4fe8
-
SHA512
c5fd75c6c945e07dd6edafeb0b17ac69ffc4a51cbe0ab96a346e394a8eeac99da330b7ca364bfa1ea4235ed33e79fcab1635ff824aad154b8a52a4c9b359c066
-
SSDEEP
192:dRHLxX7777/77QF79yrD0Lod4BYCIkIOOXM6:dRr5HYo0+CIkIOOX5
Static task
static1
Behavioral task
behavioral1
Sample
redirect.html
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
redirect
-
Size
6KB
-
MD5
bd9e3fc472b9cfba5669f127d0bf9e5a
-
SHA1
b8e11d3a3278e0cc5ac14d77aad5689e2fa7ae48
-
SHA256
75667fda1b99708d9fa4ca8a7c9ea246fa2e2c8d27411d623a140e6cb25b4fe8
-
SHA512
c5fd75c6c945e07dd6edafeb0b17ac69ffc4a51cbe0ab96a346e394a8eeac99da330b7ca364bfa1ea4235ed33e79fcab1635ff824aad154b8a52a4c9b359c066
-
SSDEEP
192:dRHLxX7777/77QF79yrD0Lod4BYCIkIOOXM6:dRr5HYo0+CIkIOOX5
Score10/10-
Modifies WinLogon for persistence
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3