General
-
Target
mlode27gb.mega.rar
-
Size
17.6MB
-
Sample
241008-snclnswdmf
-
MD5
fd9af755a885dc8d3ca202b85ea5de3c
-
SHA1
3bd012bf915c0d42f14736741295eb2c8f29d4ee
-
SHA256
36b39ead8c247bad509fdc3a262a500fb2d1c7705d386d767d7a1396bb70738a
-
SHA512
afc65651c6b26fe931572f39da99b254b40559859f565cd9c14c40427e794ff08e201506cb4f6819b31eb865190e070b9e97d13903caf91a793d1dc1a80299f2
-
SSDEEP
393216:Ds+QtcKbFQQZrRmTjvndcUtM1FpVfEjtlSo:Ds+OBFQNvdcUtM1F7s
Behavioral task
behavioral1
Sample
mlode27gb.mega.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mlode27gb.mega.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mlode27gb.mega.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
mlode27gb.mega.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
main.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
mlode27gb.mega.rar
-
Size
17.6MB
-
MD5
fd9af755a885dc8d3ca202b85ea5de3c
-
SHA1
3bd012bf915c0d42f14736741295eb2c8f29d4ee
-
SHA256
36b39ead8c247bad509fdc3a262a500fb2d1c7705d386d767d7a1396bb70738a
-
SHA512
afc65651c6b26fe931572f39da99b254b40559859f565cd9c14c40427e794ff08e201506cb4f6819b31eb865190e070b9e97d13903caf91a793d1dc1a80299f2
-
SSDEEP
393216:Ds+QtcKbFQQZrRmTjvndcUtM1FpVfEjtlSo:Ds+OBFQNvdcUtM1F7s
Score8/10-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
mlode27gb.mega.exe
-
Size
17.8MB
-
MD5
ac2e992f676cc826485c2c0fd3587285
-
SHA1
6927974e98fecba41dfe5f98dc67cf958272727e
-
SHA256
6f87f78f0e85a206c8ac68366cac181613f7f9b1eb73bb274b435fd2188c3e85
-
SHA512
e8705aa9381eb87bc574a0b1022ff685672901801df92b51b1dd6cba71119613b9937e45d3b5eada02a84c8aa7ee9f6da4915b81ba45672e61d53e10e0eb099f
-
SSDEEP
393216:8qPnLFXlrPmQ8DOETgsvfGFggv8vEGoCmopCnSq:tPLFXNOQhEpmVlBop6
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
54ee26fd0ed29fd3983c04bd4fd35c68
-
SHA1
ec2d7f38155874df79e8237811007d10dd5340a9
-
SHA256
45ec6c2c9658adbee09ecc39fe5d1ae1367cb996a7cfa4d1699d8ee8e233005a
-
SHA512
c3d3755ae57eb36c265a3650fa97d9d0c924414b7a8502c06182d9e07daab801b0aff7d06950f4425f07cbd1155dc0349bc11d7c239254ab0d22e303c9196350
-
SSDEEP
192:whVA09D8j6/WdXwWSEJKEWQJhwvai9HuMdwbVYPnw:MVAVkWuUhW02vAP5YPw
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1