General
-
Target
main.exe
-
Size
26.2MB
-
Sample
241124-md4dravpaz
-
MD5
8b4ad74978c4014d84fd38f5134ee11e
-
SHA1
71deb18626d9a5a57d0d9b1a2a41ed10e4051b1e
-
SHA256
0b58a04499a7ea5fe440b7a76cddaefded6b2facee63b3df7ff0d5fe25f8c724
-
SHA512
3ac72a2283ea1c3321f49540aa58b4a01ba9fd7ebb60c1e6b13071929c1d894dfa10fb2a1387a3563dd5bfc754c4b5815907abdfe70da9e9f78abe562648523f
-
SSDEEP
786432:S9YidhvMkCQlW828j1QtI7a8DZcQl8NBdmAmDI4p:S9JbCQlWr8BiIO6ON3vv4
Behavioral task
behavioral1
Sample
main.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
26.2MB
-
MD5
8b4ad74978c4014d84fd38f5134ee11e
-
SHA1
71deb18626d9a5a57d0d9b1a2a41ed10e4051b1e
-
SHA256
0b58a04499a7ea5fe440b7a76cddaefded6b2facee63b3df7ff0d5fe25f8c724
-
SHA512
3ac72a2283ea1c3321f49540aa58b4a01ba9fd7ebb60c1e6b13071929c1d894dfa10fb2a1387a3563dd5bfc754c4b5815907abdfe70da9e9f78abe562648523f
-
SSDEEP
786432:S9YidhvMkCQlW828j1QtI7a8DZcQl8NBdmAmDI4p:S9JbCQlWr8BiIO6ON3vv4
-
Grants admin privileges
Uses net.exe to modify the user's privileges.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Hide Artifacts: Hidden Files and Directories
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Account Manipulation
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
File and Directory Permissions Modification
1Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1