General
-
Target
H2BOTNET.exe
-
Size
5.9MB
-
Sample
250131-m4mtpawkbm
-
MD5
6121d9793742fd2ffbc985d0dad01a58
-
SHA1
27fb444e6f7f838a02ee0d88fe111ca6b53faf03
-
SHA256
5deb8f3ed733f1d73547bcd154f37f5cf991912f3bf7c6575dca700ea7c37b52
-
SHA512
40cd64c1bda206579a7c52cb269750d641b388efd719f6f1a03134a2f33e9b28774cf89a38673ace5ca47d0b5904ef83802f2d7d2dede088a9dd0bfcb39c6e6a
-
SSDEEP
98304:OVDe7pzWqi8MMhJMjarCtaCObO/OH9KkqQz4W1kgeDbFM6+3RM55eE:OwNzW4B6yA+KO0WRqi6955eE
Behavioral task
behavioral1
Sample
H2BOTNET.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
H2BOTNET.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
H2BOTNET.exe
-
Size
5.9MB
-
MD5
6121d9793742fd2ffbc985d0dad01a58
-
SHA1
27fb444e6f7f838a02ee0d88fe111ca6b53faf03
-
SHA256
5deb8f3ed733f1d73547bcd154f37f5cf991912f3bf7c6575dca700ea7c37b52
-
SHA512
40cd64c1bda206579a7c52cb269750d641b388efd719f6f1a03134a2f33e9b28774cf89a38673ace5ca47d0b5904ef83802f2d7d2dede088a9dd0bfcb39c6e6a
-
SSDEEP
98304:OVDe7pzWqi8MMhJMjarCtaCObO/OH9KkqQz4W1kgeDbFM6+3RM55eE:OwNzW4B6yA+KO0WRqi6955eE
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3