General
-
Target
Cheat DEEP WEB.rar
-
Size
6.9MB
-
Sample
250119-1cc23awrds
-
MD5
58795e27ded3bfc157e3f3bcbf7d7f72
-
SHA1
5a4548536338d63cd348e530d1a7642c7472b802
-
SHA256
0febdcc57349da7a79710b6cf65c7d6c73dfaeaad3ff7bafb73b936a7e222b4a
-
SHA512
36face98f5ff0b629ea309bd4d8bdc16e3738041a8ab9f1af79f5afd5129c610d2c6e4940c4cb7a5fdfb80dab9a6bf163fc4b734d33348f3f23b1f9618f39cc8
-
SSDEEP
196608:WRCzI0koatAmNUljyVzLGJUapTocbGDsrAzeEqq79M8iu:nV8tMYGJpM2GIAZl8u
Behavioral task
behavioral1
Sample
LaSInject/LaSInject.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LaSInject/LaSInject.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
LaSInject/amboit.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
LaSInject/amboit.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
LaSInject/LaSInject.exe
-
Size
6.9MB
-
MD5
b00cc9195c7f6c078ee86baa3275ead3
-
SHA1
0c5e32dbf11ed61bfdec3ad321f83c8e66224520
-
SHA256
ed361180fb612d5ae7a8eeab2d8d0a1657bd8bbed655fb43418bbffb080ac13b
-
SHA512
80327efe6b98253edccf69df53b8ac432c390f3c2b040e117c4c4ba9b13a90adc4c16bbcd2b8333328bd8bc847f1f4f423e241a446bed9b2e006697e11bd81a8
-
SSDEEP
196608:G1V1vFddB6ylnlPzf+JiJCsmFMvQn6hqgdh0:6FnBRlnlPSa7mmvQpgdh0
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
LaSInject/amboit.dll
-
Size
619KB
-
MD5
8e5926c798e62e3862e86d12bc2c09c1
-
SHA1
4ef4655d38dd9354a70453f7dc363a6e69bb2ab4
-
SHA256
652f86f48e144bedafb2346f3877d51e249aad3077dcf927602122fb82c30bdc
-
SHA512
8bd6c40d4182861a1a96e0f443a9b04bf6f78de7c7047f1034fb16488ff7eed8b1072dac4ace3d9969f141dd217d91c3c5f5c8f1cba94846746b79259e9a155a
-
SSDEEP
12288:ZVq3wZOtZ1oOH9HBFjj1rF6WR9QEKZm+jWodEEVIx:+b9HBFjdF99QEKZm+jWodEEWx
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3