General
-
Target
S7fiTRL.exe
-
Size
56KB
-
Sample
250309-vyjh3swpv8
-
MD5
c8723bca6d83cbad8cbc75ae323d749d
-
SHA1
e40e8e84186286495aaff872e74afd6bd9c0aafd
-
SHA256
6688a94f9872a333a01e925207a7a356dfb8e7083926cd5218a572ec67c2d458
-
SHA512
28e902f13fbd8cca7cab58df38306d85e62c98eced62e96bffce205a3bdf1f0f411830ed77373905ba6ae040536dc6da188fbdaec1db6f63e97e50e50c5a9700
-
SSDEEP
1536:DMOiQ4BKCxOhU8WdJmQ/KawN9Qe6cr9bAJZXjof4vLa0:DxizBKCyU8WdJmQ/KawN9/r9bAJZXjiY
Behavioral task
behavioral1
Sample
S7fiTRL.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
S7fiTRL.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
litehttp
v1.0.10
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Targets
-
-
Target
S7fiTRL.exe
-
Size
56KB
-
MD5
c8723bca6d83cbad8cbc75ae323d749d
-
SHA1
e40e8e84186286495aaff872e74afd6bd9c0aafd
-
SHA256
6688a94f9872a333a01e925207a7a356dfb8e7083926cd5218a572ec67c2d458
-
SHA512
28e902f13fbd8cca7cab58df38306d85e62c98eced62e96bffce205a3bdf1f0f411830ed77373905ba6ae040536dc6da188fbdaec1db6f63e97e50e50c5a9700
-
SSDEEP
1536:DMOiQ4BKCxOhU8WdJmQ/KawN9Qe6cr9bAJZXjof4vLa0:DxizBKCyU8WdJmQ/KawN9/r9bAJZXjiY
-
Litehttp family
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops startup file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Adds Run key to start application
-
System Binary Proxy Execution: Verclsid
Adversaries may abuse Verclsid to proxy execution of malicious code.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1