General
-
Target
AYZEN_Spoofer.exe
-
Size
17.9MB
-
Sample
241110-vq1sdszrfz
-
MD5
c085c4fdb2b6db3561affe6e2ba75e8e
-
SHA1
8b991a06e6c7dc7221db9ac6f0c45c8492ee282c
-
SHA256
468ecba7d45361f976db40b21f4f7ded668d75771d30663f3a5010e3b9049e65
-
SHA512
ee7dd719ea82fa15a5a8e2d45ac7f9732a67d905c6abc345167d94aa6b99fa12009f85dce00fc0d87904e6657918a972c62e864ef0bb96a3fb465e6e96f74c6b
-
SSDEEP
393216:HqPnLFXlrzQMDOETgsvfGfgDAi6vEVgO46zYqo:KPLFXNzQREksrT54Oo
Behavioral task
behavioral1
Sample
AYZEN_Spoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
AYZEN_Spoofer.exe
-
Size
17.9MB
-
MD5
c085c4fdb2b6db3561affe6e2ba75e8e
-
SHA1
8b991a06e6c7dc7221db9ac6f0c45c8492ee282c
-
SHA256
468ecba7d45361f976db40b21f4f7ded668d75771d30663f3a5010e3b9049e65
-
SHA512
ee7dd719ea82fa15a5a8e2d45ac7f9732a67d905c6abc345167d94aa6b99fa12009f85dce00fc0d87904e6657918a972c62e864ef0bb96a3fb465e6e96f74c6b
-
SSDEEP
393216:HqPnLFXlrzQMDOETgsvfGfgDAi6vEVgO46zYqo:KPLFXNzQREksrT54Oo
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1