General
-
Target
Account Uban Guide.exe
-
Size
17.9MB
-
Sample
241130-jsmg1atjck
-
MD5
790c452abcd88964f069c87cc4729757
-
SHA1
97c86315069ce14e3b95f267665b6eb49374cea5
-
SHA256
b4a86a9d9d84ef1f75153b5c9137932b594b7df6f5c4ac24726ef988cfc493a5
-
SHA512
0a6ae427654fac07b986f481d623967b373aa932c9c6d29a793b790d339ce4e6c2b8081863847f53ae17fb8067655261c0c13a6643340397d110a8bbae1a8533
-
SSDEEP
393216:RqPnLFXlrVQMDOETgsvfGQgwSjvEZB4FkzWZmq:4PLFXNVQREBVSIgmzK
Behavioral task
behavioral1
Sample
Account Uban Guide.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Account Uban Guide.exe
-
Size
17.9MB
-
MD5
790c452abcd88964f069c87cc4729757
-
SHA1
97c86315069ce14e3b95f267665b6eb49374cea5
-
SHA256
b4a86a9d9d84ef1f75153b5c9137932b594b7df6f5c4ac24726ef988cfc493a5
-
SHA512
0a6ae427654fac07b986f481d623967b373aa932c9c6d29a793b790d339ce4e6c2b8081863847f53ae17fb8067655261c0c13a6643340397d110a8bbae1a8533
-
SSDEEP
393216:RqPnLFXlrVQMDOETgsvfGQgwSjvEZB4FkzWZmq:4PLFXNVQREBVSIgmzK
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1