General
-
Target
beastoptimain.exe
-
Size
17.9MB
-
Sample
241015-fz6mnsxame
-
MD5
1ce75f24dbe65c738476bb2e53ea90d6
-
SHA1
79b16edfa74cd489bc31f7a48185ad76f67e6f54
-
SHA256
3fce152fb27699b3adb0a791d5774dc04eed321286c7c928c277d1281678136a
-
SHA512
e5b7274d64f3d94c9a46b46af8f98301081186be5178e5ed190622078cb8e7b71a7c84f8645e72262c767461abefa97008e63b62b0ec458cad4dcf05e2e64d35
-
SSDEEP
393216:0qPnLFXlr/QMDOETgsvfGwg1zB3lvErBNtMUztUq:VPLFXN/QREJS9KdPM4
Behavioral task
behavioral1
Sample
beastoptimain.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
beastoptimain.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
beastoptimain.exe
-
Size
17.9MB
-
MD5
1ce75f24dbe65c738476bb2e53ea90d6
-
SHA1
79b16edfa74cd489bc31f7a48185ad76f67e6f54
-
SHA256
3fce152fb27699b3adb0a791d5774dc04eed321286c7c928c277d1281678136a
-
SHA512
e5b7274d64f3d94c9a46b46af8f98301081186be5178e5ed190622078cb8e7b71a7c84f8645e72262c767461abefa97008e63b62b0ec458cad4dcf05e2e64d35
-
SSDEEP
393216:0qPnLFXlr/QMDOETgsvfGwg1zB3lvErBNtMUztUq:VPLFXN/QREJS9KdPM4
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1