General
-
Target
Verse.exe
-
Size
17.9MB
-
Sample
241113-t5j8hsyndn
-
MD5
71958aa4f304c2eb0426c016dd047961
-
SHA1
799215882ef02215eea2561d5bb9063edd264bad
-
SHA256
edf4ad3746b4a697bc89ff04cd7beab927f9de446804b887a962b8eb148cc4e6
-
SHA512
ee5b5f97a8b1bc0dab833c3429ed9121f943f48f37043eb2383ae1c08869d32c23a19afde75e1a46fa6404b50c58a83bad9503296cd33fe9ffd7ea022a1e2650
-
SSDEEP
393216:jqPnLFXlr/QMDOETgsvfG2xgF5iAvEeqrJZiAKq:mPLFXN/QREnUA5JJZ
Behavioral task
behavioral1
Sample
Verse.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Verse.exe
-
Size
17.9MB
-
MD5
71958aa4f304c2eb0426c016dd047961
-
SHA1
799215882ef02215eea2561d5bb9063edd264bad
-
SHA256
edf4ad3746b4a697bc89ff04cd7beab927f9de446804b887a962b8eb148cc4e6
-
SHA512
ee5b5f97a8b1bc0dab833c3429ed9121f943f48f37043eb2383ae1c08869d32c23a19afde75e1a46fa6404b50c58a83bad9503296cd33fe9ffd7ea022a1e2650
-
SSDEEP
393216:jqPnLFXlr/QMDOETgsvfG2xgF5iAvEeqrJZiAKq:mPLFXN/QREnUA5JJZ
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1