General
-
Target
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487.exe
-
Size
6.4MB
-
Sample
241102-g15x7s1pbn
-
MD5
331990a29afa36193295a7b63ea4e712
-
SHA1
5bd7935dccb305cad7c1f2026b8f6629eb2e61e4
-
SHA256
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487
-
SHA512
b7ce03289ec5339fcbe116538734ada73763fa18a42b3c95f63106bd0f85dc60111fc555eb6b5d6950d5b1fdd65f26cd4f5450bf82d330059d8184fafd52b4f2
-
SSDEEP
49152:k/+gj39KwBibw676WqeqKPn0Ppgq8LeWrqLGd5Qbbie3hkTaffK4bXDxQRzK1sp3:k/r37ibuWzxPn0PitLLCG8bbyCKsx
Static task
static1
Behavioral task
behavioral1
Sample
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487.exe
-
Size
6.4MB
-
MD5
331990a29afa36193295a7b63ea4e712
-
SHA1
5bd7935dccb305cad7c1f2026b8f6629eb2e61e4
-
SHA256
80c8797268cb88f5bef1791ccc88b62288763a27528709886e55175b9bd94487
-
SHA512
b7ce03289ec5339fcbe116538734ada73763fa18a42b3c95f63106bd0f85dc60111fc555eb6b5d6950d5b1fdd65f26cd4f5450bf82d330059d8184fafd52b4f2
-
SSDEEP
49152:k/+gj39KwBibw676WqeqKPn0Ppgq8LeWrqLGd5Qbbie3hkTaffK4bXDxQRzK1sp3:k/r37ibuWzxPn0PitLLCG8bbyCKsx
Score8/10-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Persistence
Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1