Resubmissions
20-01-2025 21:11
250120-z11mlazkay 10General
-
Target
migi executor.exe
-
Size
18.7MB
-
Sample
250120-z11mlazkay
-
MD5
3a66a83ecef69daac067702af44a9e83
-
SHA1
4d30fa21271cf558245782af2c6ed168b7670a26
-
SHA256
cf7603c14aa7babc5b4ee4be69bd7a561cbe3ba8e192cbc1b0135b01b7d84c9c
-
SHA512
9e26a6dc8bc10f4990351b4e230c22ed6a59bf3f1a7536d6999cc9404d4445c02073beb425ec4f2478cd453a8414e541a6fb3f0f14f6a1652f8ac230c876ba4d
-
SSDEEP
393216:eqPnLFXlrgUgQpDOETgsvfG7gxwB9LvE4+Zyj4Lg:TPLFXNgtQoEEoQOWO
Behavioral task
behavioral1
Sample
migi executor.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
migi executor.exe
-
Size
18.7MB
-
MD5
3a66a83ecef69daac067702af44a9e83
-
SHA1
4d30fa21271cf558245782af2c6ed168b7670a26
-
SHA256
cf7603c14aa7babc5b4ee4be69bd7a561cbe3ba8e192cbc1b0135b01b7d84c9c
-
SHA512
9e26a6dc8bc10f4990351b4e230c22ed6a59bf3f1a7536d6999cc9404d4445c02073beb425ec4f2478cd453a8414e541a6fb3f0f14f6a1652f8ac230c876ba4d
-
SSDEEP
393216:eqPnLFXlrgUgQpDOETgsvfG7gxwB9LvE4+Zyj4Lg:TPLFXNgtQoEEoQOWO
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1