General
-
Target
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.zip
-
Size
84.9MB
-
Sample
241103-zphbwatkfx
-
MD5
90fac7b60f35645f0fa4143232de496a
-
SHA1
d312439f6594fa4c1b63971c6278b4ede89c8c3d
-
SHA256
90e77c78704fabb2878871e117d94c3109721d9703b85c0d24c2ea0ae2469996
-
SHA512
fca47ced73730828115eda3f69d43c931a678e01406b76ddcb07d2618d909533b5e9606da6909021a8c556f7cc0e0c251afbdcb69269588c97a9a36e8643c9a2
-
SSDEEP
1572864:BOVPHGynU6EUqxggw1LuNnOzqpoXjBFMKtw/f/SzXNzhAUd1Ku8UuWwE0CIefsMR:oeyn8gl6OzNPMJ/3SLNzhAUv8BJM/qy
Behavioral task
behavioral1
Sample
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0.exe
-
Size
85.0MB
-
MD5
a543cc8bf0b67e3a9df1e5c3d762c553
-
SHA1
37e5f21b3fdc35b26a9d0a6066141060bf4b0402
-
SHA256
be41d7624ce4ec54963786d47a9ff839132d6719a77f1a203e06dd9b34ee73f0
-
SHA512
e497a250913efd8c13065df1bbe466bdc7a49e54b440b1999f4e92ccd630641c2d6bcafad39af1222582cde5a61129e2a558e7b741c4be7c535208f4afca8e8e
-
SSDEEP
1572864:9IC7jQipifYxqmMDnY8TzyZlhH/pAkCN8HTfcUhJq/PEJKtOa:L7j3pSU1/RPl2YKtF
Score9/10-
Enumerates VirtualBox DLL files
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1