General
-
Target
Diavlo-installer.exe
-
Size
28.0MB
-
Sample
250113-h6dxcaskdw
-
MD5
78f91d28975758fbe28bd99a76eb6f88
-
SHA1
39178fb759f049cee169b57780f30e29e45f1767
-
SHA256
b4858a6209b142388aa2a18adf8f36cedbb4bd0350358b16a166678a01f8c5c5
-
SHA512
9f65eee2fbc0e09956a1689fbf2df52deea088bf458c56864c9bbf12f59c52ea767dca66a1aa60404a4055cd0c60ac5485fe09ca89844314becd8d1527c3f3c5
-
SSDEEP
786432:sPLFXsVdzrGpSOxU+4nYQZKCL3tH17H6+Jan:gLFcvmptEnYQZJH1Pan
Behavioral task
behavioral1
Sample
Diavlo-installer.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Diavlo-installer.exe
-
Size
28.0MB
-
MD5
78f91d28975758fbe28bd99a76eb6f88
-
SHA1
39178fb759f049cee169b57780f30e29e45f1767
-
SHA256
b4858a6209b142388aa2a18adf8f36cedbb4bd0350358b16a166678a01f8c5c5
-
SHA512
9f65eee2fbc0e09956a1689fbf2df52deea088bf458c56864c9bbf12f59c52ea767dca66a1aa60404a4055cd0c60ac5485fe09ca89844314becd8d1527c3f3c5
-
SSDEEP
786432:sPLFXsVdzrGpSOxU+4nYQZKCL3tH17H6+Jan:gLFcvmptEnYQZJH1Pan
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1