General
-
Target
main.exe
-
Size
19.0MB
-
Sample
241014-cdkljazell
-
MD5
36ec10e3787e38644a2f0bd1886e9772
-
SHA1
eb4d6130a9a736b1689909bb08ac66010f27b66d
-
SHA256
6e8e38d1de830032303ce9f1256e184f4f817925a1ecf3ce5d73b04c1e99ead1
-
SHA512
51e669dceaa4c83be209e6593fef2c2acfa0d9e4dc080494d694819baf8db1662f1a9b81626598810580cd562736b4676ab640ae4670880cb67cad60593e96a6
-
SSDEEP
393216:9qPnLFXlrmQMDOETgs77fGGZMPRgA6hvE0nXcsfIUq:EPLFXNmQRE7aJRj63u
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
19.0MB
-
MD5
36ec10e3787e38644a2f0bd1886e9772
-
SHA1
eb4d6130a9a736b1689909bb08ac66010f27b66d
-
SHA256
6e8e38d1de830032303ce9f1256e184f4f817925a1ecf3ce5d73b04c1e99ead1
-
SHA512
51e669dceaa4c83be209e6593fef2c2acfa0d9e4dc080494d694819baf8db1662f1a9b81626598810580cd562736b4676ab640ae4670880cb67cad60593e96a6
-
SSDEEP
393216:9qPnLFXlrmQMDOETgs77fGGZMPRgA6hvE0nXcsfIUq:EPLFXNmQRE7aJRj63u
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1