General
-
Target
.scr
-
Size
6.0MB
-
Sample
241115-2dlw2axmbj
-
MD5
1f2987417cb377be278f0458e06170bc
-
SHA1
0d9b8a667a3b033a30e8cb44cf50872516eade14
-
SHA256
6d7a25046cfdc39532e18406b53240ba680404470e941fd448e4372d76b0f01b
-
SHA512
20301a48f40b4b4108eaf5615c8c9df7c9bf69b2b493702413bfab5149ee7e80a0da45c45af41cf09bef07dee23f00f93edbd0eadf405ba97eb612b7f3e43a91
-
SSDEEP
98304:u7Iu4+DcBF2MSamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HbM8/3Uj:uEp+D+reNoInY7/sHfbRy9Q8+Tn
Behavioral task
behavioral1
Sample
.scr
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
��z̷#Z.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
��z̷#Z.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
.scr
-
Size
6.0MB
-
MD5
1f2987417cb377be278f0458e06170bc
-
SHA1
0d9b8a667a3b033a30e8cb44cf50872516eade14
-
SHA256
6d7a25046cfdc39532e18406b53240ba680404470e941fd448e4372d76b0f01b
-
SHA512
20301a48f40b4b4108eaf5615c8c9df7c9bf69b2b493702413bfab5149ee7e80a0da45c45af41cf09bef07dee23f00f93edbd0eadf405ba97eb612b7f3e43a91
-
SSDEEP
98304:u7Iu4+DcBF2MSamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HbM8/3Uj:uEp+D+reNoInY7/sHfbRy9Q8+Tn
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
��z̷#Z.pyc
-
Size
857B
-
MD5
8123f974554946529ee2500fab200760
-
SHA1
a83dd1a093e74f879a4d7af32df9b021366271d0
-
SHA256
1f78a4eac4ba240e64a31605df1653df90ddcfe30626b3cfbe43029735485428
-
SHA512
53663402983bd14c0d091e64d82cac1f829951363ff8b90818595c42168274da2ccb0cd47a7c28b660ac15f8f150bdb2a0014802d8307366e6cc727bf62fd422
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1