General
-
Target
sample
-
Size
18KB
-
Sample
241120-vwb18a1ank
-
MD5
bfe218195170695d7ce8638abe31224d
-
SHA1
ec377be28a62936aa9be7d01f498a3126392d1c3
-
SHA256
6a17463f218298687055875ffab26c88282b83c24bdc9cbd954128ebba38742a
-
SHA512
49ace18c1ecbdd8717a46873088a9a2a55fb493d34df7b9f1b6aedaa076e9b90bb1fdcb3cbcf141ef731dfb9b4722da1ac251e89437f2abc1e1702594ec5d4bf
-
SSDEEP
384:1KVWwE1ocy4r4lbGaRMvhpN/YZeTYRlObz6r0sZmL2f31xCejiw:0VM1ocy4EEaGJpNQZ0bz6r0sZmLUlxPF
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20240708-en
Malware Config
Targets
-
-
Target
sample
-
Size
18KB
-
MD5
bfe218195170695d7ce8638abe31224d
-
SHA1
ec377be28a62936aa9be7d01f498a3126392d1c3
-
SHA256
6a17463f218298687055875ffab26c88282b83c24bdc9cbd954128ebba38742a
-
SHA512
49ace18c1ecbdd8717a46873088a9a2a55fb493d34df7b9f1b6aedaa076e9b90bb1fdcb3cbcf141ef731dfb9b4722da1ac251e89437f2abc1e1702594ec5d4bf
-
SSDEEP
384:1KVWwE1ocy4r4lbGaRMvhpN/YZeTYRlObz6r0sZmL2f31xCejiw:0VM1ocy4EEaGJpNQZ0bz6r0sZmLUlxPF
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: [email protected]
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1