General
-
Target
main.exe
-
Size
18.6MB
-
Sample
241115-ggbv1szdpg
-
MD5
0373c71a2e89ba2fee2c79cfb893b43a
-
SHA1
2149fd3bc6f4a0f26adc8ec247beaf090915d5c1
-
SHA256
e33d0be241de6d7c2afd405b3fe7073ac1652d49feda2e568f9a1592f0cd4c17
-
SHA512
ad7c0a2f9cc4e07c2177a6908708c0941e16d9ecbabd7e05d1cdaa2a472d3c107135244b2eed5c19454787edca0e406ea5af76a669ff12e80242e09224127a72
-
SSDEEP
393216:ZqPnLFXlryQMDOETgs77fGHNgayEwJvEfDCY7oFqo:QPLFXNyQRE74jyEw+WYLo
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
18.6MB
-
MD5
0373c71a2e89ba2fee2c79cfb893b43a
-
SHA1
2149fd3bc6f4a0f26adc8ec247beaf090915d5c1
-
SHA256
e33d0be241de6d7c2afd405b3fe7073ac1652d49feda2e568f9a1592f0cd4c17
-
SHA512
ad7c0a2f9cc4e07c2177a6908708c0941e16d9ecbabd7e05d1cdaa2a472d3c107135244b2eed5c19454787edca0e406ea5af76a669ff12e80242e09224127a72
-
SSDEEP
393216:ZqPnLFXlryQMDOETgs77fGHNgayEwJvEfDCY7oFqo:QPLFXNyQRE74jyEw+WYLo
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1