General
-
Target
main.exe
-
Size
17.9MB
-
Sample
241121-j3w47aznhz
-
MD5
c5f4d4b49b9d7302ae742d441675162d
-
SHA1
f054dc6950bc0979c2b8871ff666082b91d1f23e
-
SHA256
386cb7bf4bb16a313d0090c8a638fdaea2a206ab781c8f0bf3587f6c5bb7a407
-
SHA512
f4a328bd4a1487585c52e98607e42c6a899e93478ab18ac0e2ec81e7316341c592ce3daaf18e4e9f4ad2428e4bce1734432c66ab31d76030d363e13b755d0a64
-
SSDEEP
393216:KqPnLFXlrp5QMDOETgsvfGVugI0KvED3LwPi0Rq:fPLFXNp5QREpMjnwPM
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
17.9MB
-
MD5
c5f4d4b49b9d7302ae742d441675162d
-
SHA1
f054dc6950bc0979c2b8871ff666082b91d1f23e
-
SHA256
386cb7bf4bb16a313d0090c8a638fdaea2a206ab781c8f0bf3587f6c5bb7a407
-
SHA512
f4a328bd4a1487585c52e98607e42c6a899e93478ab18ac0e2ec81e7316341c592ce3daaf18e4e9f4ad2428e4bce1734432c66ab31d76030d363e13b755d0a64
-
SSDEEP
393216:KqPnLFXlrp5QMDOETgsvfGVugI0KvED3LwPi0Rq:fPLFXNp5QREpMjnwPM
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1