General

  • Target

    dupemixsetup.zip

  • Size

    75.1MB

  • Sample

    241123-sy1q9atlcp

  • MD5

    97269c1e20985df0a209d86b2d1568c6

  • SHA1

    33964d2137c80d6f5de453f895163d9546a47c7e

  • SHA256

    cbddec6d9091851c28ee13427b2ff80a2512ba306c12643705d071e10c863b08

  • SHA512

    70f90fdc7c055fc30ebe88e15109d26f791d27d39cbe894157861218dfcd4a1c9c345750c54e63315e9d045f740767470a1f7f2086e059b336b5fac3251b1c20

  • SSDEEP

    1572864:t7vNY6lqpEXyDR8GQcyUZRuoXD4ZKaeDN+TstXmrMgLVBq/da:o6lqeylHbZRGeRAEXmwgbq1a

Malware Config

Targets

    • Target

      dupemixsetup.zip

    • Size

      75.1MB

    • MD5

      97269c1e20985df0a209d86b2d1568c6

    • SHA1

      33964d2137c80d6f5de453f895163d9546a47c7e

    • SHA256

      cbddec6d9091851c28ee13427b2ff80a2512ba306c12643705d071e10c863b08

    • SHA512

      70f90fdc7c055fc30ebe88e15109d26f791d27d39cbe894157861218dfcd4a1c9c345750c54e63315e9d045f740767470a1f7f2086e059b336b5fac3251b1c20

    • SSDEEP

      1572864:t7vNY6lqpEXyDR8GQcyUZRuoXD4ZKaeDN+TstXmrMgLVBq/da:o6lqeylHbZRGeRAEXmwgbq1a

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

    • Target

      DupeMix Setup 1.0.0.exe

    • Size

      75.2MB

    • MD5

      afd0ccff8ca6ce275caf9edfc739091d

    • SHA1

      b37ad4adc9cb1bff06ba9ddf80153a93126b807a

    • SHA256

      644372d31b62c327439aefff7ae0d2d2b09cf8a9963c4d10408731358c1ce879

    • SHA512

      62c546fcc2639851e508b43b3271e111b8deafd9e36a08acf99cdf142169e2693301e41a98ba4ec21b59e59a9e62f34a507b67f294cbb07b87fbe78580dd5c2e

    • SSDEEP

      1572864:saJ39Kk9Md8JlB8ceyIS7nqYdd6hIEuZRob8j7yn8QNjBkjsW:spk9M+/vP7nMuvWs7y8Q/k4W

    • Hexon family

    • Hexon stealer

      Hexon is a stealer written in Electron NodeJS.

    • Blocklisted process makes network request

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates processes with tasklist

    • Target

      $PLUGINSDIR/SpiderBanner.dll

    • Size

      9KB

    • MD5

      17309e33b596ba3a5693b4d3e85cf8d7

    • SHA1

      7d361836cf53df42021c7f2b148aec9458818c01

    • SHA256

      996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93

    • SHA512

      1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

    • SSDEEP

      192:5lkE3uqRI1y7/xcfK4PRef6gQzJyY1rpKlVrw:5lkMBI1y7UKcef6XzJrpKY

    Score
    3/10
    • Target

      $PLUGINSDIR/StdUtils.dll

    • Size

      100KB

    • MD5

      c6a6e03f77c313b267498515488c5740

    • SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    • SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    • SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • SSDEEP

      3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      $PLUGINSDIR/WinShell.dll

    • Size

      3KB

    • MD5

      1cc7c37b7e0c8cd8bf04b6cc283e1e56

    • SHA1

      0b9519763be6625bd5abce175dcc59c96d100d4c

    • SHA256

      9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6

    • SHA512

      7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

    Score
    3/10
    • Target

      $PLUGINSDIR/app-64.7z

    • Size

      74.6MB

    • MD5

      220de7ae6a29b2b20e66ff46605c1b0f

    • SHA1

      c71eb7e69816d14d5f8d88b6f24ecc597ed8e021

    • SHA256

      904efd8694afce96461b4076e210d6864ad58ec44986d27a17703155dd26d476

    • SHA512

      0395cc5819bd221109b705af76f4ee8e1ba7e60a7337aa765657ec0398e0c8779ff860e4d505632085ec1b588dd38243fa1d21fe87234f5d81f7cce67de5eac6

    • SSDEEP

      1572864:SJ39Kk9Md8JlB8ceyIS7nqYdd6hIEuZRob8j7yn8QNjBkjsD:xk9M+/vP7nMuvWs7y8Q/k4D

    Score
    1/10
    • Target

      DupeMix.exe

    • Size

      154.7MB

    • MD5

      e6ba1fe2af55343b8bba7458b3f79c1b

    • SHA1

      919a43cfeb47cc166da4e87b176bacf6b163177f

    • SHA256

      8273d70055ae808bbead30f19e5df4eeccf0794bf170482def4a12fbc10c7a76

    • SHA512

      104ad7ac2ae9fc4e28b348d318449552f2b9efeaec3654265a4a469e92d5473687efa18ed573146fe386ed9954b7387904a0b5ae436296d9cd1355b09ef3eb9a

    • SSDEEP

      1572864:8Tmw0ciLNpDPuAvHxJLkY2O6Ea3f9kwZXeT6EivLp1vUAtdjtZn+f4FnIvGaC9dU:Xv6E70+Mk

    • Hexon family

    • Hexon stealer

      Hexon is a stealer written in Electron NodeJS.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates processes with tasklist

    • Target

      chrome_100_percent.pak

    • Size

      124KB

    • MD5

      acd0fa0a90b43cd1c87a55a991b4fac3

    • SHA1

      17b84e8d24da12501105b87452f86bfa5f9b1b3c

    • SHA256

      ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b

    • SHA512

      3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774

    • SSDEEP

      3072:vlKzwqCT4wDNzIwL2o418Gb0+VRLf0ld0GY3cQ39Vm2I:vlKzwt4uEgK18Gb0OV8ld0GecQ3f2

    Score
    3/10
    • Target

      chrome_200_percent.pak

    • Size

      173KB

    • MD5

      4610337e3332b7e65b73a6ea738b47df

    • SHA1

      8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b

    • SHA256

      c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c

    • SHA512

      039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51

    • SSDEEP

      3072:4DQYaEQN6AJPKNzIwafR54x5GMR+F44ffbdZnYw9p4AbIVGYoDd+HxNK/rIM0:4DQYaNN68QEVgx5GMRejnbdZnVE6YopY

    Score
    3/10
    • Target

      d3dcompiler_47.dll

    • Size

      4.7MB

    • MD5

      2191e768cc2e19009dad20dc999135a3

    • SHA1

      f49a46ba0e954e657aaed1c9019a53d194272b6a

    • SHA256

      7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d

    • SHA512

      5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

    • SSDEEP

      49152:KCZnRO4XyM53Rkq4ypQqdoRpmruVNYvkaRwvhiD0N+YEzI4og/RfzHLeHTRhFRNc:xG2QCwmHPnog/pzHAo/A6l

    Score
    1/10
    • Target

      ffmpeg.dll

    • Size

      2.7MB

    • MD5

      a007299c49fa50aeff594655859780ae

    • SHA1

      d202f1f617023763a0e9418878e8ecac96be9fd4

    • SHA256

      b78f0036621ad1d5833289f2ad509963ef78f1a89a3c7df0f1370fd2d35a2804

    • SHA512

      444c4baa1e1d941bd04f78184cec519c6eb53a83fbc3aa3ea30522bffc9ecde73ebe7b910c1a37c345429298ada3c0ffcb3e3849e21b2009487b5cd1a02cb2a9

    • SSDEEP

      49152:WdTodIrn9wbFV6Ps2cA7SJ/W1C1fLPzhkE7hjU7gUxGJwDw3lCQTQY/N3lzl3heH:C79fe/CmP6w3lXQYef/3

    Score
    1/10
    • Target

      icudtl.dat

    • Size

      10.1MB

    • MD5

      2134e5dbc46fb1c46eac0fe1af710ec3

    • SHA1

      dbecf2d193ae575aba4217194d4136bd9291d4db

    • SHA256

      ee3c8883effd90edfb0ff5b758c560cbca25d1598fcb55b80ef67e990dd19d41

    • SHA512

      b9b50614d9baebf6378e5164d70be7fe7ef3051cfff38733fe3c7448c5de292754bbbb8da833e26115a185945be419be8dd1030fc230ed69f388479853bc0fcb

    • SSDEEP

      98304:GKPBQYOo+ddlymOk25flQCUliXUxiG9Ha93Whla6ZGdnp/8j:GKPBhORjOhCliXUxiG9Ha93Whla6ZGr4

    Score
    3/10
    • Target

      libEGL.dll

    • Size

      469KB

    • MD5

      ca5bb0794b7700601e9438283d458665

    • SHA1

      7fcf090b19820b9450937be800575c526448b581

    • SHA256

      4a8be3b4d9fe790efdce38cff8f312a2f8276908d6703e0c6c37818e217cf1e3

    • SHA512

      36ebab858fe7e014837548575389e7df2e86676888e4a9039c736d0f2e6463102e68989b794d949ddb16d9bcce43ce55737fcf2a4b09b1667bf968a9540e9f32

    • SSDEEP

      6144:afuE2DT96QHENooSYBjLkt4sasMHemPwlrX+nZiML7hn:afuE2DbkGoS2jLku/wWUiNn

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      7.3MB

    • MD5

      05b585464f18fe0e3bddb20527697d66

    • SHA1

      8bcec2f0b409afa9ff054e25f3ce85eb9bd50010

    • SHA256

      0bb7c6c08b569c1d2de90a40e6c142591e160a7c6cb15d21807f3404a48c4287

    • SHA512

      f680ab9c3070f443c7359bb3f0c2032f5c58c88c7823e4592e8212ce8815ea5f463c86df113f5320944c62d3cb4e8d45b9b4dcaadccc1ac9bf203ae4bb52083c

    • SSDEEP

      98304:WJTPQhRQ4t2fzqJ3IZ155Rl5F/tpcAgsOMN:Wm2foIzRJosr

    Score
    1/10
    • Target

      locales/en-US.pak

    • Size

      338KB

    • MD5

      5e3813e616a101e4a169b05f40879a62

    • SHA1

      615e4d94f69625dda81dfaec7f14e9ee320a2884

    • SHA256

      4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687

    • SHA512

      764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594

    • SSDEEP

      6144:xiLqIY2MuZYLMMP9ecGmM8faYdY4K55TiSbn8vMwS:xiLqIp34MM+mM0Y55eSKMwS

    Score
    3/10
    • Target

      resources.pak

    • Size

      5.0MB

    • MD5

      31c7d4b11ad95dfe539dd098e0fab736

    • SHA1

      5418682d939ce8485ecc9125b872c14ffec662c2

    • SHA256

      a251019eb08f1e695e935d224544bda37c5ae092ba68a89fa1fe3bd19bde4f5c

    • SHA512

      f868a4afa4e0d5c561873d2a728e267f98da2df3fb90966e5736d496b6a24e71769a02b0346b27b7dcce11cbe07248e309f50a89977dc8e5bbc06d6cc31bf738

    • SSDEEP

      98304:9LYsbEcnNWz49PDq2Awkmqmcph1Dd42cjrwrbHw4o0DPelwG3RC:90WcMButpphpd4jkrU4oeelrRC

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

discovery
Score
7/10

behavioral2

Score
1/10

behavioral3

discovery
Score
7/10

behavioral4

hexoncredential_accessdiscoveryspywarestealer
Score
10/10

behavioral5

discovery
Score
3/10

behavioral6

discovery
Score
3/10

behavioral7

discovery
Score
3/10

behavioral8

discovery
Score
3/10

behavioral9

discovery
Score
3/10

behavioral10

discovery
Score
3/10

behavioral11

discovery
Score
3/10

behavioral12

discovery
Score
3/10

behavioral13

Score
1/10

behavioral14

Score
1/10

behavioral15

Score
1/10

behavioral16

hexoncredential_accessdiscoveryspywarestealer
Score
10/10

behavioral17

discovery
Score
3/10

behavioral18

Score
3/10

behavioral19

discovery
Score
3/10

behavioral20

Score
3/10

behavioral21

Score
1/10

behavioral22

Score
1/10

behavioral23

Score
1/10

behavioral24

discovery
Score
3/10

behavioral25

Score
3/10

behavioral26

Score
1/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

discovery
Score
3/10

behavioral31

Score
3/10

behavioral32

discovery
Score
3/10