Overview
overview
10Static
static
10VANTA TEMP.rar
windows10-2004-x64
8VANTA TEMP.rar
windows10-ltsc 2021-x64
10VANTA TEMP.rar
windows11-21h2-x64
1vanta perm/vanta.exe
windows10-2004-x64
8vanta perm/vanta.exe
windows10-ltsc 2021-x64
10vanta perm/vanta.exe
windows11-21h2-x64
8��O���.pyc
windows10-2004-x64
��O���.pyc
windows10-ltsc 2021-x64
��O���.pyc
windows11-21h2-x64
General
-
Target
VANTA TEMP.rar
-
Size
8.3MB
-
Sample
241202-cvpltavkft
-
MD5
03e69d91f86543e623990c2de8bb5629
-
SHA1
3a2c1d731f574216fb6cc0a403a41f150d72445f
-
SHA256
2cbaea8e3a01a54e663d098aa41605bb5a67178f341e8f56656259d274d13a35
-
SHA512
ac64125c715b84a54adc5530f988afee0464392779f08d7eea1af6f3715f2f55fd226b63f5700cca4ad06e8b52fbbfa76ff1a5cab37788a46716618a72dbbbeb
-
SSDEEP
196608:pPkXMhRdMqBh000xC8LJItCGDi86fAJ7Ay3iMDJeV3zKs/5Ks1V6uj5:p+MNnBuBbLawGDi8IY7ANMI865euj5
Behavioral task
behavioral1
Sample
VANTA TEMP.rar
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
VANTA TEMP.rar
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
VANTA TEMP.rar
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
vanta perm/vanta.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
vanta perm/vanta.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
vanta perm/vanta.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
��O���.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
��O���.pyc
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
��O���.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
VANTA TEMP.rar
-
Size
8.3MB
-
MD5
03e69d91f86543e623990c2de8bb5629
-
SHA1
3a2c1d731f574216fb6cc0a403a41f150d72445f
-
SHA256
2cbaea8e3a01a54e663d098aa41605bb5a67178f341e8f56656259d274d13a35
-
SHA512
ac64125c715b84a54adc5530f988afee0464392779f08d7eea1af6f3715f2f55fd226b63f5700cca4ad06e8b52fbbfa76ff1a5cab37788a46716618a72dbbbeb
-
SSDEEP
196608:pPkXMhRdMqBh000xC8LJItCGDi86fAJ7Ay3iMDJeV3zKs/5Ks1V6uj5:p+MNnBuBbLawGDi8IY7ANMI865euj5
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
vanta perm/vanta.exe
-
Size
8.4MB
-
MD5
cbf4dc6f6a4534326092a07fac9e5b63
-
SHA1
c86d844ad9daed65a61bd0059c56c25596dbc093
-
SHA256
27d87871199cb1908ebdc0aa4d7694fd5ef967b75126e6b33a8d44661a2f937f
-
SHA512
5d2210bd82bbbbb1c58fbe7ed45f1b7ebd6fcf1da98344201231c09795ad255be9c8d53f57c658da20daebd6a24a74e86e71ef6bf50430163b3650ef44e689fe
-
SSDEEP
196608:iRuYdwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/j+:nIHziK1piXLGVE4UrS0VJC
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
A potential corporate email address has been identified in the URL: [email protected]
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
��O���.pyc
-
Size
1KB
-
MD5
760704f2c28a98885dd6336095f3949a
-
SHA1
0e35f4129e3af4d5ff7bbf84d30eeebecf3428e8
-
SHA256
5a513beea563ec6564576a3934030577516ae47de068887c1884b98d85ac756b
-
SHA512
f9020317b9408656ad91d4010f9c4d92259bb9ddf833a6b703d58715c0b3e55a4f0c1aad50dd24902f8cc0b85aa743faa0b934bdd58f9095d154b6d041d68a92
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3