General
-
Target
KRONIXSOLUTIONS 16.0.exe
-
Size
12.0MB
-
Sample
241005-wl6nhsybmq
-
MD5
625c58f8edb48067902abea77ea23689
-
SHA1
cbb5c8b40d13412adcfa46442fea3bae3b204ddd
-
SHA256
6a7ea11077342bf118da94546d7c1707e99add24cc89dfd9915e65e54d58de04
-
SHA512
22fd2022f379afc873b58d971fbe5882e459b33f06d00be5d3faf65727eef5aaee80e778100453743f1fe6d097bb0c54bcde0ba5739d0123cac64bfa6e691436
-
SSDEEP
98304:+CEtdFBgdqpy8EamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RaBM3H3usTy:+JFPeN/FJMIDJf0gsAGK4Rau3pTT+
Behavioral task
behavioral1
Sample
KRONIXSOLUTIONS 16.0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
KRONIXSOLUTIONS 16.0.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
KRONIXSOLUTIONS 16.0.exe
-
Size
12.0MB
-
MD5
625c58f8edb48067902abea77ea23689
-
SHA1
cbb5c8b40d13412adcfa46442fea3bae3b204ddd
-
SHA256
6a7ea11077342bf118da94546d7c1707e99add24cc89dfd9915e65e54d58de04
-
SHA512
22fd2022f379afc873b58d971fbe5882e459b33f06d00be5d3faf65727eef5aaee80e778100453743f1fe6d097bb0c54bcde0ba5739d0123cac64bfa6e691436
-
SSDEEP
98304:+CEtdFBgdqpy8EamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RaBM3H3usTy:+JFPeN/FJMIDJf0gsAGK4Rau3pTT+
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3