General
-
Target
main.exe
-
Size
17.6MB
-
Sample
241205-qqlk9awnh1
-
MD5
4edced436524b16a1f5eaeaf7d182346
-
SHA1
e2626eacc78d6573d7696407f0de1db5be040135
-
SHA256
a0c2878314622706025c60f880d11c7af08b2900e9603d580d9cfd6544599d71
-
SHA512
45b26f06998c2085c14c2d2825b540458be65916a869d77eb360228ceacc7ae303f3ad581075d8c046640c5093102a2c31b91692f69fd5af2fd4f753c22c4ded
-
SSDEEP
393216:DqPnLFXlr8gQpDOETgsvfG9wagqKvECk6C1uAL9q:GPLFXNlQoEM1jaC1u2o
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
17.6MB
-
MD5
4edced436524b16a1f5eaeaf7d182346
-
SHA1
e2626eacc78d6573d7696407f0de1db5be040135
-
SHA256
a0c2878314622706025c60f880d11c7af08b2900e9603d580d9cfd6544599d71
-
SHA512
45b26f06998c2085c14c2d2825b540458be65916a869d77eb360228ceacc7ae303f3ad581075d8c046640c5093102a2c31b91692f69fd5af2fd4f753c22c4ded
-
SSDEEP
393216:DqPnLFXlr8gQpDOETgsvfG9wagqKvECk6C1uAL9q:GPLFXNlQoEM1jaC1u2o
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1