General
-
Target
FNPingReducer.exe
-
Size
17.9MB
-
Sample
250127-3mwchazjes
-
MD5
5be02858241fc1aea0f41a535b50752b
-
SHA1
c6f7839eda867229d5460c212eb614799382a112
-
SHA256
f0a7ac9caa89de2d5c9885ea7b1356dfc6d7ce932d6a3bd0cd0e5183a4586275
-
SHA512
5a95f9ca0fd367f7c1b1262c1c9d56a8c4debfb1384170ac27c4257157521f8939fb4ff0bef5a6fc23f7ed6935e4f4017c04c8e9cdb414acce7cbf4c870dd9a4
-
SSDEEP
393216:0qPnLFXlrkQPDOETgsvfGwlgKF4DvEmOIFpq:VPLFXNkQ6EflL/ai
Behavioral task
behavioral1
Sample
FNPingReducer.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
FNPingReducer.exe
-
Size
17.9MB
-
MD5
5be02858241fc1aea0f41a535b50752b
-
SHA1
c6f7839eda867229d5460c212eb614799382a112
-
SHA256
f0a7ac9caa89de2d5c9885ea7b1356dfc6d7ce932d6a3bd0cd0e5183a4586275
-
SHA512
5a95f9ca0fd367f7c1b1262c1c9d56a8c4debfb1384170ac27c4257157521f8939fb4ff0bef5a6fc23f7ed6935e4f4017c04c8e9cdb414acce7cbf4c870dd9a4
-
SSDEEP
393216:0qPnLFXlrkQPDOETgsvfGwlgKF4DvEmOIFpq:VPLFXNkQ6EflL/ai
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1