General
-
Target
Built.exe
-
Size
79.4MB
-
Sample
241015-a288payepn
-
MD5
0dd89b59dc7c2014e5ba460c96fc9034
-
SHA1
0bedbcf2c73d8bb665f55fe0b9e8cdaf65fee2ad
-
SHA256
62ea2367770cfe7a87b09503858dfeb7db03fd9e0c4605b7b4d86a63ee066be8
-
SHA512
9a1568449b1f70c2a433eea6bb7c09605c51cfb09a0e09c7dac962388f8c251ef07cbe4b2289351a1bd7f91ad590ade46655785caba391e2569d9e54642c0a35
-
SSDEEP
1572864:WT01ghxDyeRk6yXE7FNATntks4xi3n9jSFCa1So9dKshD5Iqv1ynpKj:WTo0Rk6YYFa5k6X9QlRAsl5Irp
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
�I�F���.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
79.4MB
-
MD5
0dd89b59dc7c2014e5ba460c96fc9034
-
SHA1
0bedbcf2c73d8bb665f55fe0b9e8cdaf65fee2ad
-
SHA256
62ea2367770cfe7a87b09503858dfeb7db03fd9e0c4605b7b4d86a63ee066be8
-
SHA512
9a1568449b1f70c2a433eea6bb7c09605c51cfb09a0e09c7dac962388f8c251ef07cbe4b2289351a1bd7f91ad590ade46655785caba391e2569d9e54642c0a35
-
SSDEEP
1572864:WT01ghxDyeRk6yXE7FNATntks4xi3n9jSFCa1So9dKshD5Iqv1ynpKj:WTo0Rk6YYFa5k6X9QlRAsl5Irp
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
�I�F���.pyc
-
Size
1KB
-
MD5
30276de13ebbce0638cc377acb535f26
-
SHA1
b546c42a4d5cbc077045422be4da176c27ec4dfd
-
SHA256
19ce97b7b68fa694d146b498eaa84122efe0e85028814c3628bc7e3926f7e094
-
SHA512
cdceaf4a390a110bd21e5b5120b464e54cc844bc4b77f0ae7a8665eff296b0fa5061e147323ea8f1bf90b8298724bcc09699aac74862e5eb182732b6ab3b23dd
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1