General
-
Target
ChromeSetup.exe
-
Size
930KB
-
Sample
241107-yry7qsxhlr
-
MD5
de04168171981a90f56a126ec055ba19
-
SHA1
766704b6e12a7db436663eb7e287160e736979b7
-
SHA256
c891493c98f76e82e18c0e57e51b96fe8da86b086d67632e2495a793d3298bf2
-
SHA512
784f4b6954a56e2f09f3b3f1d29ae6d1ad14c814f3aad6391972654c398c68bcf7745902c368cbfcb8778f16cb33aa62210c937d48e6d8876d567fcd2a657013
-
SSDEEP
12288:lS6vgPZN3V4smWPc7H3/BPyf13SFyIz8VOHa8ASSMCFFi0mWWaos2Z8kM+:06vqtcDZPyf13WyODSMyc08aoz8kM
Static task
static1
Behavioral task
behavioral1
Sample
ChromeSetup.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ChromeSetup.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
ChromeSetup.exe
-
Size
930KB
-
MD5
de04168171981a90f56a126ec055ba19
-
SHA1
766704b6e12a7db436663eb7e287160e736979b7
-
SHA256
c891493c98f76e82e18c0e57e51b96fe8da86b086d67632e2495a793d3298bf2
-
SHA512
784f4b6954a56e2f09f3b3f1d29ae6d1ad14c814f3aad6391972654c398c68bcf7745902c368cbfcb8778f16cb33aa62210c937d48e6d8876d567fcd2a657013
-
SSDEEP
12288:lS6vgPZN3V4smWPc7H3/BPyf13SFyIz8VOHa8ASSMCFFi0mWWaos2Z8kM+:06vqtcDZPyf13WyODSMyc08aoz8kM
-
Asyncrat family
-
Nightingale family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-