General
-
Target
AUTO(FISH).exe
-
Size
17.9MB
-
Sample
241210-n7wfnsznaj
-
MD5
3c42e22a54928d75ccac4105a82868bb
-
SHA1
829feb57fd9875675dbddde1ea6c6222b4da3ed6
-
SHA256
f23663167a792b393957ebad8fdcf684ce4958bba4a6845f47da71dffdfc7c7e
-
SHA512
ebe3467f84c897bee748e28419b9e1666b8932e38c6d18893aee4857826e7183e07654cb2f5b9b44f880d677c04910bf61f3d2320c64d8ff3473c0dac828de5e
-
SSDEEP
393216:mqPnLFXlrRQMDOETgsvfGIgkvG9yvEHEPC3Mclpm:LPLFXNRQREJZgqC3MR
Behavioral task
behavioral1
Sample
AUTO(FISH).exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
AUTO(FISH).exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
AUTO(FISH).exe
-
Size
17.9MB
-
MD5
3c42e22a54928d75ccac4105a82868bb
-
SHA1
829feb57fd9875675dbddde1ea6c6222b4da3ed6
-
SHA256
f23663167a792b393957ebad8fdcf684ce4958bba4a6845f47da71dffdfc7c7e
-
SHA512
ebe3467f84c897bee748e28419b9e1666b8932e38c6d18893aee4857826e7183e07654cb2f5b9b44f880d677c04910bf61f3d2320c64d8ff3473c0dac828de5e
-
SSDEEP
393216:mqPnLFXlrRQMDOETgsvfGIgkvG9yvEHEPC3Mclpm:LPLFXNRQREJZgqC3MR
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1