Resubmissions

15-02-2025 04:47

250215-fep47avpfs 8

15-02-2025 00:27

250215-ar7bca1pgp 8

14-02-2025 22:26

250214-2cxbdaznem 8

14-02-2025 22:26

250214-2clvmszndp 8

14-02-2025 22:24

250214-2bvfdsznbp 8

14-02-2025 22:24

250214-2bdgwaznap 8

14-02-2025 22:17

250214-17tnaszqdw 8

14-02-2025 01:43

250214-b5drmaylcm 8

14-02-2025 01:41

250214-b38h8ayqfs 8

14-02-2025 01:37

250214-b1s1rayqc1 4

General

  • Target

    http://noescape.exe

  • Sample

    250214-bqy41sypc1

Malware Config

Targets

    • Target

      http://noescape.exe

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Network Share Discovery

      Attempt to gather information on host network.

MITRE ATT&CK Enterprise v15

Tasks