General
-
Target
Hydroponically.exe
-
Size
1.0MB
-
Sample
250211-wsb3gsvnar
-
MD5
0cabe66c0ed542e70a70b64927fec71f
-
SHA1
1fafdf96adb43e3c34463c80eb9d85f80af0b379
-
SHA256
76ea8da0b1641a77ef92d4a73aaa44d9c5d0abe392b546148f61af0e895a0ba9
-
SHA512
cfa24572c06e5575c22edfccb0c4d0c926e170b651082d513d504cc3b882163df7ec16f7f347265e915decf43b91ecdb31628d612f39134cc7d59ec083647f41
-
SSDEEP
24576:LzOEC045+XIG9UFPXbQEEDbrQzNG5Hgapm:eEeQ4nfbQEEf3NgX
Static task
static1
Behavioral task
behavioral1
Sample
Hydroponically.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Hydroponically.exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
Hydroponically.exe
-
Size
1.0MB
-
MD5
0cabe66c0ed542e70a70b64927fec71f
-
SHA1
1fafdf96adb43e3c34463c80eb9d85f80af0b379
-
SHA256
76ea8da0b1641a77ef92d4a73aaa44d9c5d0abe392b546148f61af0e895a0ba9
-
SHA512
cfa24572c06e5575c22edfccb0c4d0c926e170b651082d513d504cc3b882163df7ec16f7f347265e915decf43b91ecdb31628d612f39134cc7d59ec083647f41
-
SSDEEP
24576:LzOEC045+XIG9UFPXbQEEDbrQzNG5Hgapm:eEeQ4nfbQEEf3NgX
-
Guloader family
-
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
11KB
-
MD5
3f176d1ee13b0d7d6bd92e1c7a0b9bae
-
SHA1
fe582246792774c2c9dd15639ffa0aca90d6fd0b
-
SHA256
fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e
-
SHA512
0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6
-
SSDEEP
192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Component Object Model Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2