General
-
Target
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
-
Size
11KB
-
Sample
241119-rs8dgaxgpp
-
MD5
09eeab1b61f3ad1d6d86b0e387ce7ea0
-
SHA1
3deb1dd145517c9141d0ef99eae2b727542f7d2b
-
SHA256
b0a46f6c23505e15c64d15e5c3be708a68d3dc4098c53cd0db24c9550a5c11a3
-
SHA512
57ff8471c338e490afd029f49be9b9731782aeaf8fa84d533fd09046511b4216248a9015490545c2519ae5681b32769e8061308ec963b2d5a5e1178127094552
-
SSDEEP
192:+u3d5a7061PAA4iY5XccWqJYpffR2UXF9b4p06nsGGfkCeGkcwDXFhFqeVvdf1uf:1M/4FXcpfhfHXFJ4p06BGfkDXFhFq8xE
Static task
static1
Behavioral task
behavioral1
Sample
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
fd42e30a-cb43-44b6-b3d3-8f1ac4c98221.htm
-
Size
11KB
-
MD5
09eeab1b61f3ad1d6d86b0e387ce7ea0
-
SHA1
3deb1dd145517c9141d0ef99eae2b727542f7d2b
-
SHA256
b0a46f6c23505e15c64d15e5c3be708a68d3dc4098c53cd0db24c9550a5c11a3
-
SHA512
57ff8471c338e490afd029f49be9b9731782aeaf8fa84d533fd09046511b4216248a9015490545c2519ae5681b32769e8061308ec963b2d5a5e1178127094552
-
SSDEEP
192:+u3d5a7061PAA4iY5XccWqJYpffR2UXF9b4p06nsGGfkCeGkcwDXFhFqeVvdf1uf:1M/4FXcpfhfHXFJ4p06BGfkDXFhFq8xE
-
Manipulates Digital Signatures
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Deobfuscate/Decode Files or Information
1Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1