General
-
Target
view
-
Size
91KB
-
Sample
241121-wfhphatrdx
-
MD5
6a13b13bad53f5f9a5d36899510a8afe
-
SHA1
c2f561e7dbf8a21c14ac7500502096960c478300
-
SHA256
15e157fb06c410f249d968c3761b91d04454bcf9459d6f136f81345d881ba2b0
-
SHA512
3120856f7ab725ac8da80138059a974bd237d79a46b4f2d6a014e341056b432f865f792d09731021be673322550ea54e4a677121bb33eb478933c50cf61293da
-
SSDEEP
1536:ocEiY5YP4jhGJ4m3plHNrCq59MHhfwCumZQ2MLN:SjuZhCqHYTY
Static task
static1
Behavioral task
behavioral1
Sample
view.html
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
view
-
Size
91KB
-
MD5
6a13b13bad53f5f9a5d36899510a8afe
-
SHA1
c2f561e7dbf8a21c14ac7500502096960c478300
-
SHA256
15e157fb06c410f249d968c3761b91d04454bcf9459d6f136f81345d881ba2b0
-
SHA512
3120856f7ab725ac8da80138059a974bd237d79a46b4f2d6a014e341056b432f865f792d09731021be673322550ea54e4a677121bb33eb478933c50cf61293da
-
SSDEEP
1536:ocEiY5YP4jhGJ4m3plHNrCq59MHhfwCumZQ2MLN:SjuZhCqHYTY
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-