General
-
Target
chrome.exe
-
Size
17.7MB
-
Sample
241003-ya8d3swfmb
-
MD5
2620c6da4ae0252b84ac079cfe267bc1
-
SHA1
e87aa5dad66574831addf8e394e1dc32ef0cc82f
-
SHA256
f9b4cfe2561b041342ad23745d93aab76e5541a5af9dd1a54808557a5453df40
-
SHA512
9d8120f6ec70c2bf4c36549205fce52d41c91c23acb018ad29bc58587d404ae4f0f371917d6147f97077281e54b33aae805abb35d77c95ee00aa3d63cf87ff8a
-
SSDEEP
393216:KqPnLFXlrPmQ8DOETgsvfGFtgUnLvEDpH84q:fPLFXNOQhEyXwtQ
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
chrome.exe
-
Size
17.7MB
-
MD5
2620c6da4ae0252b84ac079cfe267bc1
-
SHA1
e87aa5dad66574831addf8e394e1dc32ef0cc82f
-
SHA256
f9b4cfe2561b041342ad23745d93aab76e5541a5af9dd1a54808557a5453df40
-
SHA512
9d8120f6ec70c2bf4c36549205fce52d41c91c23acb018ad29bc58587d404ae4f0f371917d6147f97077281e54b33aae805abb35d77c95ee00aa3d63cf87ff8a
-
SSDEEP
393216:KqPnLFXlrPmQ8DOETgsvfGFtgUnLvEDpH84q:fPLFXNOQhEyXwtQ
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1