General
-
Target
Built.exe
-
Size
17.8MB
-
Sample
241221-j5qp7awngz
-
MD5
85a20b1130f97555855654ebad623678
-
SHA1
eceb6b17e5115ed302193ecdc4e80cf362ba086e
-
SHA256
23b550ae22c1849ae209562e61ed13f6411532c8d9655c5c012641b14004de4b
-
SHA512
0bc80d39de5b4a29366c15726010986c312634c774727e6cfc842a36437e5b0a5edf6e151f73b80f17bcee43c215bcafc6b50d2069c61ee1146b87291d3a4083
-
SSDEEP
393216:hqPnLFXlrWQ8DOETgsvfG7gsNvEvpc2R20Imm:IPLFXNWQhEiFiv2G2T
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
17.8MB
-
MD5
85a20b1130f97555855654ebad623678
-
SHA1
eceb6b17e5115ed302193ecdc4e80cf362ba086e
-
SHA256
23b550ae22c1849ae209562e61ed13f6411532c8d9655c5c012641b14004de4b
-
SHA512
0bc80d39de5b4a29366c15726010986c312634c774727e6cfc842a36437e5b0a5edf6e151f73b80f17bcee43c215bcafc6b50d2069c61ee1146b87291d3a4083
-
SSDEEP
393216:hqPnLFXlrWQ8DOETgsvfG7gsNvEvpc2R20Imm:IPLFXNWQhEiFiv2G2T
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1