General
-
Target
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
-
Size
248KB
-
Sample
250202-npw99asjbr
-
MD5
0a4b7e409a27aa973a66eba20bf662dd
-
SHA1
4e1abafdfe6e9c0cd30161bb6b46431c3c2d15cf
-
SHA256
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281
-
SHA512
4f07bdc3ad3c1322da1b5207eca1fd84b3f5f5d3814fd569d37281680b6524e87079e70bba295cef422b3b2e42e805d5f59b1b293cd3dcb711d8ea26458d28dc
-
SSDEEP
3072:etsLhXr6AQuO5MRDZ5ZuI80fP1yjQUEcOMyNx80oB1WtEkdGFEk0pyyNxRmvh:fGD5MR5HZrbbxt+WtzdGGk0UyDy
Static task
static1
Behavioral task
behavioral1
Sample
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
Resource
win10v2004-20250129-en
Malware Config
Targets
-
-
Target
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281.exe
-
Size
248KB
-
MD5
0a4b7e409a27aa973a66eba20bf662dd
-
SHA1
4e1abafdfe6e9c0cd30161bb6b46431c3c2d15cf
-
SHA256
4cb3f1c6ec766e8a677938e45caef6db8442b4c7e5f8068005e36e7620930281
-
SHA512
4f07bdc3ad3c1322da1b5207eca1fd84b3f5f5d3814fd569d37281680b6524e87079e70bba295cef422b3b2e42e805d5f59b1b293cd3dcb711d8ea26458d28dc
-
SSDEEP
3072:etsLhXr6AQuO5MRDZ5ZuI80fP1yjQUEcOMyNx80oB1WtEkdGFEk0pyyNxRmvh:fGD5MR5HZrbbxt+WtzdGGk0UyDy
-
Blackshades family
-
Blackshades payload
-
Modifies firewall policy service
-
Adds policy Run key to start application
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
5