General
-
Target
exhisa .exe
-
Size
13.9MB
-
Sample
241124-2kbdwatlhy
-
MD5
3488d90bb570a7b112810e53b6ddcdca
-
SHA1
29ba0d7a8c4c43bb9a5579433052e4f3fe347bdf
-
SHA256
35a2cc0635e0cde9cb882f2c24bb28c28b5b41e2c372a4c83b5143e05ecdc77a
-
SHA512
8572764ee11b6b3064ebae00960683b29b717a85c137bc8feff3126e6f5bf47b6fa6641cd8eb21b13e2a7ce0761582035b8d0740084fcda5825e09922d40d12c
-
SSDEEP
196608:/nXZAlqpb7KX/x1HhyehNJm3AqdKDnO8NpkSgsAGKaR2Fdmytu9mEypXblepZ6sV:PZAlqYXJBb/m3pgDOEkSgsvauQBrA/
Behavioral task
behavioral1
Sample
exhisa .exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
exhisa .exe
Resource
win11-20241023-en
Behavioral task
behavioral3
Sample
main.pyc
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
main.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
exhisa .exe
-
Size
13.9MB
-
MD5
3488d90bb570a7b112810e53b6ddcdca
-
SHA1
29ba0d7a8c4c43bb9a5579433052e4f3fe347bdf
-
SHA256
35a2cc0635e0cde9cb882f2c24bb28c28b5b41e2c372a4c83b5143e05ecdc77a
-
SHA512
8572764ee11b6b3064ebae00960683b29b717a85c137bc8feff3126e6f5bf47b6fa6641cd8eb21b13e2a7ce0761582035b8d0740084fcda5825e09922d40d12c
-
SSDEEP
196608:/nXZAlqpb7KX/x1HhyehNJm3AqdKDnO8NpkSgsAGKaR2Fdmytu9mEypXblepZ6sV:PZAlqYXJBb/m3pgDOEkSgsvauQBrA/
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
main.pyc
-
Size
1KB
-
MD5
1c65418e7a672e3c175033085cf5bc3f
-
SHA1
b21cb50dfcf93782bd7636dcb42b0206366b1935
-
SHA256
97d54fdfb92d4106f6301566e9121b9a3a277e88dffeffb0ad2f695e59106cae
-
SHA512
6fd7fcd7e0a70f1b399cf5942e535b16833907d1459ca604a2fca1da1c5a4b755302bcfed6cf0d813dcf27748023d67b84e18c35e15353ff9d28855e6c58a23c
Score3/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1