General
-
Target
Updater.exe
-
Size
6.9MB
-
Sample
241231-dx4zysvmhw
-
MD5
f31aec83a680fe7f96b210a87cc1dbbd
-
SHA1
6c8a03f065f02eb909221bc3aaa84792ef39ab73
-
SHA256
84ad8527d13faccb7845cf85051c3b5a8abb6deac226a4a1b933b738ff250e52
-
SHA512
99f83163bc2bd1862a672f77505109c78dbb2469a3d0a8908774ad207cc87f743202be2b6405792b6657e0b2ef684b0849156e06ff23eae0979cc4a72650b7b0
-
SSDEEP
98304:hCFDDjWM8JEE1FgBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEV:hCFD0m8eNTfm/pf+xk4dWRpmrbW3jmr0
Behavioral task
behavioral1
Sample
Updater.exe
Resource
win10v2004-20241007-fr
Behavioral task
behavioral2
Sample
>�6c��.pyc
Resource
win10v2004-20241007-fr
Malware Config
Targets
-
-
Target
Updater.exe
-
Size
6.9MB
-
MD5
f31aec83a680fe7f96b210a87cc1dbbd
-
SHA1
6c8a03f065f02eb909221bc3aaa84792ef39ab73
-
SHA256
84ad8527d13faccb7845cf85051c3b5a8abb6deac226a4a1b933b738ff250e52
-
SHA512
99f83163bc2bd1862a672f77505109c78dbb2469a3d0a8908774ad207cc87f743202be2b6405792b6657e0b2ef684b0849156e06ff23eae0979cc4a72650b7b0
-
SSDEEP
98304:hCFDDjWM8JEE1FgBamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEV:hCFD0m8eNTfm/pf+xk4dWRpmrbW3jmr0
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
>�6c��.pyc
-
Size
1KB
-
MD5
d784c6b0cd75950bf1b63b08425ef403
-
SHA1
f1f5a9d700086feecbcaafe156d8ba6f1a02551b
-
SHA256
bd6680058e046d5e96fb2faab0847516390ee1d427d70f14f7427945a6a5b91b
-
SHA512
73d9dcb55e69fd2e029c9f128083d943fb45cff87a40713a92d7de96c5125c26805b0507c12634605c72268dd82ab23a4fbea3a8e8981e2683c977cd2f767f48
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1