General
-
Target
Utility.exe
-
Size
17.9MB
-
Sample
241019-3w971swgke
-
MD5
2a63534b1e6a3c5200c9c809e77f4c00
-
SHA1
ba37d30a06a84fbff4e0d7869ea18369441edfed
-
SHA256
7e3aab64a2b41bb8f9ac91cfa1fc1c0560358aa078d4de1852ae340183e18cf5
-
SHA512
83dec0cf545f38912371013e6ddfbb5e09bf979517789547e590863117611af961a6405c30392fedef68bdcf6b45b64516f114f2430ea34c4b7dd1dd7b6a4ca8
-
SSDEEP
393216:QqPnLFXlriQ8DOETgsvfG2gVwM+EXB3vExt/2vUiiq:RPLFXNiQhEhJvg2T+vJ
Behavioral task
behavioral1
Sample
Utility.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Utility.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Utility.exe
-
Size
17.9MB
-
MD5
2a63534b1e6a3c5200c9c809e77f4c00
-
SHA1
ba37d30a06a84fbff4e0d7869ea18369441edfed
-
SHA256
7e3aab64a2b41bb8f9ac91cfa1fc1c0560358aa078d4de1852ae340183e18cf5
-
SHA512
83dec0cf545f38912371013e6ddfbb5e09bf979517789547e590863117611af961a6405c30392fedef68bdcf6b45b64516f114f2430ea34c4b7dd1dd7b6a4ca8
-
SSDEEP
393216:QqPnLFXlriQ8DOETgsvfG2gVwM+EXB3vExt/2vUiiq:RPLFXNiQhEhJvg2T+vJ
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1