General
-
Target
uzis_multitool[1].exe
-
Size
17.8MB
-
Sample
241013-1s5f9a1bjc
-
MD5
a3947b1c55f9a8dcbb230a218a9aeb3c
-
SHA1
a62ca1bda722a607853eb4cd6d709a93fd38bb67
-
SHA256
ff1efba13914f32548586fa1165b714193e00f070c603d581a798d9288ae1777
-
SHA512
14dac1cb90f7b90c1dda771eb7dc48dd132e5d117c2ce7eac93d94b3c145d0381a864864c93c63c28855ee3b78aecd1003cc15e7a364870d26443baf8db2e688
-
SSDEEP
393216:OqPnLFXlreQ+DOETgsvfG76gr0BZnvEAdaY3kp9Bq:DPLFXNeQ/Ezo0B+AT3kU
Behavioral task
behavioral1
Sample
uzis_multitool[1].exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
uzis_multitool[1].exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
uzis_multitool[1].exe
-
Size
17.8MB
-
MD5
a3947b1c55f9a8dcbb230a218a9aeb3c
-
SHA1
a62ca1bda722a607853eb4cd6d709a93fd38bb67
-
SHA256
ff1efba13914f32548586fa1165b714193e00f070c603d581a798d9288ae1777
-
SHA512
14dac1cb90f7b90c1dda771eb7dc48dd132e5d117c2ce7eac93d94b3c145d0381a864864c93c63c28855ee3b78aecd1003cc15e7a364870d26443baf8db2e688
-
SSDEEP
393216:OqPnLFXlreQ+DOETgsvfG76gr0BZnvEAdaY3kp9Bq:DPLFXNeQ/Ezo0B+AT3kU
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1