General
-
Target
built-crypted.exe
-
Size
8.8MB
-
Sample
241208-tt44jsymfy
-
MD5
4ac9cec0cf0199ce79e3899a8d44db5b
-
SHA1
895da0ca4b3178037d53874d2298e22399e45b66
-
SHA256
d89943cd164b8020c6524263625192dc0c0291eea871a427ea309f009cca30fc
-
SHA512
1e5a6ba2ed32d21bc2c8f3568f3b405adb282c507924728943c8adf0f415663572c7e890dc27c4ca4964cbaeb26364f5553047ded3215fd2ecb5b14f68420be5
-
SSDEEP
196608:VL1FkRKr88QuE6QPB9MxtcnRNDqaSPiJmKRQMsyBVvB:hkco8BdQnMxKnrP01zyDvB
Static task
static1
Behavioral task
behavioral1
Sample
built-crypted.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
built-crypted.exe
-
Size
8.8MB
-
MD5
4ac9cec0cf0199ce79e3899a8d44db5b
-
SHA1
895da0ca4b3178037d53874d2298e22399e45b66
-
SHA256
d89943cd164b8020c6524263625192dc0c0291eea871a427ea309f009cca30fc
-
SHA512
1e5a6ba2ed32d21bc2c8f3568f3b405adb282c507924728943c8adf0f415663572c7e890dc27c4ca4964cbaeb26364f5553047ded3215fd2ecb5b14f68420be5
-
SSDEEP
196608:VL1FkRKr88QuE6QPB9MxtcnRNDqaSPiJmKRQMsyBVvB:hkco8BdQnMxKnrP01zyDvB
-
Milleniumrat family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1