General
-
Target
main.exe
-
Size
23.8MB
-
Sample
241008-n5nm2s1gng
-
MD5
3c21e21091d121631f1233d46791446d
-
SHA1
3d9c840ad0812d9058abbb53eb825b9aa0e2b491
-
SHA256
eb1e8880a041300a68790cc7c21ad86a60f7884c3325d4a51ddfbfa5acdd3cc8
-
SHA512
029079c44db97c5e6e7a135f3899764267df36c90dd05b9f8f9e4923e1637bb276f45ed293ab956bbde1d71a103d96a361444bd97815ac7f645803c51a9b88c9
-
SSDEEP
393216:qqPnLFXlrxde9TQDyRTDOETgsvcGMmVgCupWpXpW/cc3I+M4rs:/PLFXNOQDyAE/rlDKdI+w
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
23.8MB
-
MD5
3c21e21091d121631f1233d46791446d
-
SHA1
3d9c840ad0812d9058abbb53eb825b9aa0e2b491
-
SHA256
eb1e8880a041300a68790cc7c21ad86a60f7884c3325d4a51ddfbfa5acdd3cc8
-
SHA512
029079c44db97c5e6e7a135f3899764267df36c90dd05b9f8f9e4923e1637bb276f45ed293ab956bbde1d71a103d96a361444bd97815ac7f645803c51a9b88c9
-
SSDEEP
393216:qqPnLFXlrxde9TQDyRTDOETgsvcGMmVgCupWpXpW/cc3I+M4rs:/PLFXNOQDyAE/rlDKdI+w
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1