General
-
Target
test.exe
-
Size
17.9MB
-
Sample
241106-1pfzgs1jhq
-
MD5
157978c2e12f0e75372471a25eb68f6d
-
SHA1
daf64207449bb6dc8305e023d8417e632e596880
-
SHA256
ad09ea73cbf0743407747b384ab20857effd581b8823831babcf2d7e5375b31b
-
SHA512
0d9d2826eaad6652c4dcaa4d077032adcaf625ab73a90f117502981201b1b827db480bf8030b472ace11b682eeb0435605c863f0823e8c628a15442ca56ba12d
-
SSDEEP
393216:2qPnLFXlrzQMDOETgsvfGXg1vvEypyVQ+fqo:bPLFXNzQREms0RV6o
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
17.9MB
-
MD5
157978c2e12f0e75372471a25eb68f6d
-
SHA1
daf64207449bb6dc8305e023d8417e632e596880
-
SHA256
ad09ea73cbf0743407747b384ab20857effd581b8823831babcf2d7e5375b31b
-
SHA512
0d9d2826eaad6652c4dcaa4d077032adcaf625ab73a90f117502981201b1b827db480bf8030b472ace11b682eeb0435605c863f0823e8c628a15442ca56ba12d
-
SSDEEP
393216:2qPnLFXlrzQMDOETgsvfGXg1vvEypyVQ+fqo:bPLFXNzQREms0RV6o
Score7/10-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
-
-
Target
main.pyc
-
Size
7KB
-
MD5
2d5d03c40cd5fb0edd9100c45fc40708
-
SHA1
5b264f63af39b6b81ace8ae45746918c0ce7a810
-
SHA256
c801b0f29f43368b3b499ee3cb700f0116af3a98caa63825c236fe62c58e8b1e
-
SHA512
3e34529ddffad02ec9644b26887036eba3c69743f79b27f3073451c53e6596abc5d17eec8dd41d1a02237dafbcbb27920a3058b885651d236fc690edc925cb96
-
SSDEEP
192:wWPWEkJGY4D8qp6WdXw+8K3uNdMoFQJhw5sMdwMsnw:dSJfWu+8RNdt026PMsw
Score3/10 -
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1