General
-
Target
hoodz beamer.rar
-
Size
18.8MB
-
Sample
241019-25stnavcpc
-
MD5
f1b46ec7d9a41dd7a44c4fd40d493958
-
SHA1
54a0c54777204abacad609ae8ea97c7d34337901
-
SHA256
b4ce474d5ae3ccb827e983931b14e72ac83e97bb5b542c5b99a325d4ce8b63ed
-
SHA512
6985ea966286d7389ff6789d17beb224f97f7073c1fa4ac1df5d022eb35ccbe1bab32563835512b9ab4cb282df7940db2c7aa496a67190f4bffcf5de066c3ac7
-
SSDEEP
393216:qB54zIsJnibGkJTnDtd+OARF9XC6YrsTtjNNW4N:qOziNBdYvXC5aRXN
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
19.0MB
-
MD5
36ec10e3787e38644a2f0bd1886e9772
-
SHA1
eb4d6130a9a736b1689909bb08ac66010f27b66d
-
SHA256
6e8e38d1de830032303ce9f1256e184f4f817925a1ecf3ce5d73b04c1e99ead1
-
SHA512
51e669dceaa4c83be209e6593fef2c2acfa0d9e4dc080494d694819baf8db1662f1a9b81626598810580cd562736b4676ab640ae4670880cb67cad60593e96a6
-
SSDEEP
393216:9qPnLFXlrmQMDOETgs77fGGZMPRgA6hvE0nXcsfIUq:EPLFXNmQRE7aJRj63u
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1