General
-
Target
loader.zip
-
Size
7.5MB
-
Sample
250222-fef7aaxqhz
-
MD5
7f2f06d02b476ed73c433aa113d5b7ad
-
SHA1
f730e74339067cf0c29e881e7b781c947fb31e31
-
SHA256
5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7
-
SHA512
bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5
-
SSDEEP
196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE
Behavioral task
behavioral1
Sample
loader.zip
Resource
win11-20250217-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
@��:pHM.pyc
Resource
win11-20250217-en
Malware Config
Targets
-
-
Target
loader.zip
-
Size
7.5MB
-
MD5
7f2f06d02b476ed73c433aa113d5b7ad
-
SHA1
f730e74339067cf0c29e881e7b781c947fb31e31
-
SHA256
5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7
-
SHA512
bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5
-
SSDEEP
196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE
Score7/10-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies system executable filetype association
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
-
-
Target
loader.exe
-
Size
7.6MB
-
MD5
f641a5b9b0ac2f79f1458c85060cf08d
-
SHA1
ae2813fa9919f894b9f0d2cc77c7d6a36ad7080c
-
SHA256
f60447588e7b48fdb404c0356bb80f4f226eee6cc7075455c5d4b7fe77e1b1cb
-
SHA512
6c09626cc2651aed9c2ad55fd5d4c0fe35b22d3a960302426dfb0b5d47f79b48db3b9f4162fa46c198c59426363a8d7975e5a426ee3ef4a87499c43f1c9e5306
-
SSDEEP
196608:GW506gq6evTwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoB:MqHgIH20drLYRZjoB
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
@��:pHM.pyc
-
Size
1KB
-
MD5
6cd66b2f40400ee779c6e42477a4b375
-
SHA1
04d272dcd105191dbecf2334493a3f85051acfe8
-
SHA256
394e24d501014bd27d6fb7c1b8201f47a1dcea7a31e3160fee1d1df44520b2ae
-
SHA512
272d524e2b2f84340fd09dec17e72c25fece5a3c717e3fab79209982ed3efcbdf343ce5ae4613e7b561314060b9f1bbc382443f7642d27142088b34089ae6ff6
Score1/10 -
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
3Change Default File Association
1Component Object Model Hijacking
1Netsh Helper DLL
1Defense Evasion
Modify Registry
3Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3