General
-
Target
main.bat
-
Size
17.9MB
-
Sample
241004-yav4rawhre
-
MD5
28c78a747598c5540c656454e48312ae
-
SHA1
82f3c24e15a453d98a4870c1aed0239bdf5ebd69
-
SHA256
186197fe395c3ebb3056d0cffe7e329531e5b21eac81402d9ca4a5df830b1660
-
SHA512
e0ab1df72f1d8a464c9fb69bc34bccfb5deaedc0c100dcbc43e888feb3366629d2c3c59ce692f46389b9b12996610d6361ac35f23fff2c437aa643592641caa5
-
SSDEEP
393216:PqPnLFXlrZQ+DOETgsvfGEg2HLvEl1uDZ+krddq:iPLFXNZQ/EdpQl4t+kK
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
main.bat
-
Size
17.9MB
-
MD5
28c78a747598c5540c656454e48312ae
-
SHA1
82f3c24e15a453d98a4870c1aed0239bdf5ebd69
-
SHA256
186197fe395c3ebb3056d0cffe7e329531e5b21eac81402d9ca4a5df830b1660
-
SHA512
e0ab1df72f1d8a464c9fb69bc34bccfb5deaedc0c100dcbc43e888feb3366629d2c3c59ce692f46389b9b12996610d6361ac35f23fff2c437aa643592641caa5
-
SSDEEP
393216:PqPnLFXlrZQ+DOETgsvfGEg2HLvEl1uDZ+krddq:iPLFXNZQ/EdpQl4t+kK
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1