General
-
Target
Spoofer-free.exe
-
Size
18.6MB
-
Sample
240928-yg6h3awdrg
-
MD5
479d5df3622c32c9c4f70f39051686f1
-
SHA1
3148ece25b8d47daebac1c56cf85130e5fdab875
-
SHA256
ed8c6c8b540cfbe6d09258f9fb75f841c174ed299af4829ac909e267a1cdad6d
-
SHA512
2f35c700a9351d0884bb97ca1f81d30269c7e36d2c532b6efa6599dbc3caee2d998c7fab63cb645e8e9b982a9bacf22cf6937327880976685b5053a92e5c7745
-
SSDEEP
393216:PqPnLFXlrNQ+DOETgs77fGfgg/AvEj204QaKq:iPLFXNNQ/E7spBj4h
Behavioral task
behavioral1
Sample
Spoofer-free.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Spoofer-free.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Spoofer-free.exe
-
Size
18.6MB
-
MD5
479d5df3622c32c9c4f70f39051686f1
-
SHA1
3148ece25b8d47daebac1c56cf85130e5fdab875
-
SHA256
ed8c6c8b540cfbe6d09258f9fb75f841c174ed299af4829ac909e267a1cdad6d
-
SHA512
2f35c700a9351d0884bb97ca1f81d30269c7e36d2c532b6efa6599dbc3caee2d998c7fab63cb645e8e9b982a9bacf22cf6937327880976685b5053a92e5c7745
-
SSDEEP
393216:PqPnLFXlrNQ+DOETgs77fGfgg/AvEj204QaKq:iPLFXNNQ/E7spBj4h
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1