Overview
overview
10Static
static
1048db28a1f4...c5.exe
windows7-x64
148db28a1f4...c5.exe
windows10-2004-x64
1595539b200...6e.exe
windows7-x64
7595539b200...6e.exe
windows10-2004-x64
7689ca565d8...33.exe
windows7-x64
7689ca565d8...33.exe
windows10-2004-x64
1079c92912e5...1e.exe
windows7-x64
179c92912e5...1e.exe
windows10-2004-x64
17c7a1691b4...c8.exe
windows7-x64
77c7a1691b4...c8.exe
windows10-2004-x64
7General
-
Target
새 폴더 (2).zip
-
Size
60.4MB
-
Sample
241112-g5z8hsxaqe
-
MD5
eb8a382123a3636f81b31c3e6086d411
-
SHA1
987e2abc6f859f21e4073fbd896c88683fcd9ac3
-
SHA256
73b6df0add9bc6b5792d274d316ecd70d636847db25ce6f3e63e77fb72369037
-
SHA512
2695047c269213e0abd9fbd151d8721f7c282b90ef951cffe47e0b29727ea68c08c96059f5907cd7326b45a375a8030f991e73baf3f5e8e9003589ad2ba99123
-
SSDEEP
1572864:MSfVw4VJDATTOJAIPN29bKI6L5qneN2mP7YXW9I:Pm4VJDAT6JAoN29bkeXx
Behavioral task
behavioral1
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
mofongoloader
https://securetestconnect.app/connection/test
-
user_agent
UA/1
Targets
-
-
Target
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5.exexx
-
Size
674KB
-
MD5
ab860c777ce9ad76b1c478623e3cda2a
-
SHA1
38dfc133a769a459ee322488a96179d71da56892
-
SHA256
48db28a1f4bd01050aa13f021c3b1dfd7aa7ed807592e0a23f3c7afbb7db78c5
-
SHA512
f23b09e3da1c1f7941a87b57e91ea0988524ad2a2b2aa56114331590e1da0d1d3da98a10626b48ecd995d54d02652236cf03f0707b4132b4c56e8b8d50d25548
-
SSDEEP
6144:GvZCqtNVfi0ZzEGFwMHViJ1bK+zjD+FM0kz6kUJYeASlF/+xZRtiKzvzaOchY5:GvZCCukzEGCMHViPbK+zWFPkzNzDKO5
Score1/10 -
-
-
Target
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e.exexx
-
Size
28.7MB
-
MD5
a75bd304b668cfa64640b22e4c231349
-
SHA1
2a72f8bb89047305062d53337098c5e0573d9ff3
-
SHA256
595539b2009fdf8e53a409f7a21b779e7a670ca61f0a8dc216b226d753a54e6e
-
SHA512
60f35560be97a8674c5c1e1916340655f619702dc6d95cfa32a4c7fad284e27b45a5dda5fc79a2ce0d8e0a87583ca1caa0ecae54ece10a1f5abdd5b9cdc41471
-
SSDEEP
786432:kxZADx6Nw9CJarloXOqTIzauR93oSQkNd:t6N9c2XRPC93oLkf
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33.exexx
-
Size
27.6MB
-
MD5
220d1ef8904ec400ad2c63fe40c21a75
-
SHA1
04c5bb65b1a65e7a159c17b8bbaf4e286009370e
-
SHA256
689ca565d836bb3ee3d52797c7d7c89e7d5b941259bc47403703355049c0dd33
-
SHA512
1ec2cfb174fd749bbec0a87a8cffbfe81284b68a7a09ae1a32cea51cf4d17dadad0f04f185aa8492ec186d409b1422f20ae59b530ed15598e453d923b9f3be4a
-
SSDEEP
786432:kbnq/UYXTOALUyampRu7cAcwKwV8dPNck+/Fj4y:H/UYXlYyad1cBwV++/Wy
-
Gh0st RAT payload
-
Gh0strat family
-
Purplefox family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e.exexx
-
Size
674KB
-
MD5
b2dc35428fe92c4e21e9c4d70fbeb6f2
-
SHA1
73be5079aa7495f8839cf9497ad5d3151b4ee5a2
-
SHA256
79c92912e557a1cbd3299221952a42beb62ce12baa8aafaae285171bd88cf71e
-
SHA512
93ec4638e10b4906c48e5c5eadf6264ba0170cba8645f6cf549524c965ac269709cd74bf359870b90450b7bccfdf7445006244f7b34af2c5a995f849a7de00dd
-
SSDEEP
6144:GvZCqtNVfi0ZzEGFwMHViJ1bK+zjD+FM0kz6kUJYeASlF/+xZRtiKzvzaOchYF:GvZCCukzEGCMHViPbK+zWFPkzNzDKOF
Score1/10 -
-
-
Target
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8.exexx
-
Size
3.9MB
-
MD5
c8420fe03d088ed9558dea175de7711f
-
SHA1
2feece2652375bee5171f31d10caf9ea4291ed36
-
SHA256
7c7a1691b47e950616215c93e2cd4ec1893f646a44146ca7b6cd6352b9dee2c8
-
SHA512
ef935456d3fd0a7f32b1abb8bfc2ccb9b37443835157f9b8805875fce15ab1b9ec1639253d6ec20b83dadae714531e49f6c26621fbb5ffca46af665a5df88a2a
-
SSDEEP
98304:rUg3G64EgdhTNuQmT19jSxkUDsY5HJFWHzFJkyTnIDQVVNdM8LtUIgCfhsT:lGNXNu/LjeOY5pFovkyTIDQs8LqIgCK
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
8System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1