General
-
Target
.
-
Size
115KB
-
Sample
241120-eej3havndj
-
MD5
8448def5e65be4c84cfadb06f496583c
-
SHA1
83c566d4fe5316938aea91063495d522e0600946
-
SHA256
9364212ef3ed57f3b4800b00ac2b96789f8a08cc8493c8bf1e4061c07af169e6
-
SHA512
2a11687ed99855e03dd602c92e80051735864b052987f7c82f12176f0ada51e179d0b1cf354f8a97167afcfae0284e3699921b0b179f131b197f181225663e00
-
SSDEEP
1536:9g1gXjUtGZ/X7ItkGpSlqKquBKquBKquBKquXBQQEMiAO6CIsdTGic+p6lQx/0:LGGZ/XskGslyBQPnIWGto6lu0
Static task
static1
Behavioral task
behavioral1
Sample
.html
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
.
-
Size
115KB
-
MD5
8448def5e65be4c84cfadb06f496583c
-
SHA1
83c566d4fe5316938aea91063495d522e0600946
-
SHA256
9364212ef3ed57f3b4800b00ac2b96789f8a08cc8493c8bf1e4061c07af169e6
-
SHA512
2a11687ed99855e03dd602c92e80051735864b052987f7c82f12176f0ada51e179d0b1cf354f8a97167afcfae0284e3699921b0b179f131b197f181225663e00
-
SSDEEP
1536:9g1gXjUtGZ/X7ItkGpSlqKquBKquBKquBKquXBQQEMiAO6CIsdTGic+p6lQx/0:LGGZ/XskGslyBQPnIWGto6lu0
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: 6633dd5dcff475e6fb744426_&@2x.png
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1