General
-
Target
4ad426172639516e2dd5e98c32f670db5457065c05f8ab87269459eebb057552.zip
-
Size
10.5MB
-
Sample
241218-cx45aazpgm
-
MD5
d89f52e79b2fbd1e4a26949deba20c9e
-
SHA1
9cad352e8541858d742c4bc34caa9e489ea1207f
-
SHA256
4ad426172639516e2dd5e98c32f670db5457065c05f8ab87269459eebb057552
-
SHA512
051863854282542e5605cea6a440c8173a9e34be7e66c4c780653765545e01a60fb4ddc59ec66ab4c193918712b49e6fdacffe543757a37dd43d4415b0ade13d
-
SSDEEP
196608:mdPn96e6pdPn96e6+iiXX2vNZobVUr/49UG2xcz2pLlJLOhhOZjk/Wvv42cH:mdPI3pdPI3+i/joxU72UG2ezSJJqhh5z
Behavioral task
behavioral1
Sample
yedek-main/Ja4va.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
yedek-main/Ja4va.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yedek-main/Java.jar
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
yedek-main/Java.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
yedek-main/WindowsUpdateAgent.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
yedek-main/WindowsUpdateAgent.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
yedek-main/Ja4va.jar
-
Size
1.7MB
-
MD5
6d729b3dda0471989f1efdf02abfe1b5
-
SHA1
c8273107db98ac14930dd01f2fff66ebb7cc8df4
-
SHA256
d1200740675d379b2aae43691a3014912bcd413b717cecb90e49cd640e31fd61
-
SHA512
4bd26fec9dbf840aa77770cbb7f392c77557e85f0beff8ce888df5b1fc942952e34b7617f03087fa24272cc662bc47949c6083efbb923f6c23db4e9b8866b8f3
-
SSDEEP
24576:X5yR2a7sHTRRWyQZuGTlC9zcg4I8Rt0GR5SJrr7ST+GlGQTIL3wIkmv8DCQmzg:JEOHTRMw8kpxnynRF+GlGQTIL+mUDCQv
-
-
-
Target
yedek-main/Java.jar
-
Size
1.7MB
-
MD5
6d729b3dda0471989f1efdf02abfe1b5
-
SHA1
c8273107db98ac14930dd01f2fff66ebb7cc8df4
-
SHA256
d1200740675d379b2aae43691a3014912bcd413b717cecb90e49cd640e31fd61
-
SHA512
4bd26fec9dbf840aa77770cbb7f392c77557e85f0beff8ce888df5b1fc942952e34b7617f03087fa24272cc662bc47949c6083efbb923f6c23db4e9b8866b8f3
-
SSDEEP
24576:X5yR2a7sHTRRWyQZuGTlC9zcg4I8Rt0GR5SJrr7ST+GlGQTIL3wIkmv8DCQmzg:JEOHTRMw8kpxnynRF+GlGQTIL+mUDCQv
-
-
-
Target
yedek-main/WindowsUpdateAgent.exe
-
Size
7.4MB
-
MD5
7d4b7c9479e46227120720f2a2dcccda
-
SHA1
a85ad8695c5f1703ab6b1abd07eff86b4da4adca
-
SHA256
94525a0b12c1be31a958bb137d9c1a6f35cef4e9b0c01f95b75981bae5518d93
-
SHA512
c0cb31863256206f4c0e39d3baa8d5869e2cab630b3f9e1453d45964b054ca85ff11c5cf17c157efe84d16dc1f413f27cb762dfa1a0ab8f2a4556d901faa3c07
-
SSDEEP
196608:xmlEzPoLjv+bhqNVoB8Ck5c7GpNlpq41J2Jbk9qtlDf6s0:ChL+9qz88Ck+7q3p91JBqfJ0
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3