General
-
Target
AzureSpooferHWID.jar
-
Size
639KB
-
Sample
241220-zwy8zavjhl
-
MD5
ea029a25bb7bff5f342f58106321f461
-
SHA1
8a6c20abcc40a57f83c4554284023438ffc89596
-
SHA256
dbb87b3e7913ccf3c7552c9944aaa3805bfa6e34b6dd92688e74d2a3c7545201
-
SHA512
838a872b933de658711b5c513c0256c1064ff9e4584f7c67d21723b277e2b1e3693256c1b5bc805d28427634461b0801982ca6c109d236eb7c48fed68b1afac9
-
SSDEEP
12288:4X/TQv/Jd7+Nl4F7AfW3gO/jRT+dhcNmvYg+NuRz63Qus2NkSUxDMn:4XbQ3T+L41v3gONqomvlQ1QuRN3UxDMn
Behavioral task
behavioral1
Sample
AzureSpooferHWID.jar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AzureSpooferHWID.jar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
AzureSpooferHWID.jar
-
Size
639KB
-
MD5
ea029a25bb7bff5f342f58106321f461
-
SHA1
8a6c20abcc40a57f83c4554284023438ffc89596
-
SHA256
dbb87b3e7913ccf3c7552c9944aaa3805bfa6e34b6dd92688e74d2a3c7545201
-
SHA512
838a872b933de658711b5c513c0256c1064ff9e4584f7c67d21723b277e2b1e3693256c1b5bc805d28427634461b0801982ca6c109d236eb7c48fed68b1afac9
-
SSDEEP
12288:4X/TQv/Jd7+Nl4F7AfW3gO/jRT+dhcNmvYg+NuRz63Qus2NkSUxDMn:4XbQ3T+L41v3gONqomvlQ1QuRN3UxDMn
Score6/10-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1