General
-
Target
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800.exe
-
Size
869KB
-
Sample
250218-dba5rawmdx
-
MD5
c8c9b10e2c7b2965853834236a0e67e2
-
SHA1
075aa7e4daa62dafac2714eea8fb6583743a6276
-
SHA256
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800
-
SHA512
0b98007272f18edf7c6d0eeb111721e9b6961a39e728f6743179bf7691b82464f517b419f31ec0135674963e1d20278ee3dd32926d4cfb1af4aacd99c5f94bd3
-
SSDEEP
24576:Q4nbY9dZZZZZZZZZZyAUeaBHsS9aD+ije2MtOvvV3HQmhQ436/zq:Q+qZZZZZZZZZZvUfOvertOvv1wzq6G
Static task
static1
Behavioral task
behavioral1
Sample
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800.exe
-
Size
869KB
-
MD5
c8c9b10e2c7b2965853834236a0e67e2
-
SHA1
075aa7e4daa62dafac2714eea8fb6583743a6276
-
SHA256
7a4fd260c41cbac29db7929cf2f2b457a97c564ffc145cdce30f8ce37529b800
-
SHA512
0b98007272f18edf7c6d0eeb111721e9b6961a39e728f6743179bf7691b82464f517b419f31ec0135674963e1d20278ee3dd32926d4cfb1af4aacd99c5f94bd3
-
SSDEEP
24576:Q4nbY9dZZZZZZZZZZyAUeaBHsS9aD+ije2MtOvvV3HQmhQ436/zq:Q+qZZZZZZZZZZvUfOvertOvv1wzq6G
-
Guloader family
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
d6f54d2cefdf58836805796f55bfc846
-
SHA1
b980addc1a755b968dd5799179d3b4f1c2de9d2d
-
SHA256
f917aef484d1fbb4d723b2e2d3045cb6f5f664e61fbb3d5c577bd1c215de55d9
-
SHA512
ce67da936a93d46ef7e81abc8276787c82fd844c03630ba18afc3528c7e420c3228bfe82aeda083bb719f2d1314afae913362abd1e220cb364606519690d45db
-
SSDEEP
192:acA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:RR7SrtTv53tdtTgwF4SQbGPX36wJMw
Score3/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1