General
-
Target
VespyGrabber.exe
-
Size
13.9MB
-
Sample
250326-xg3lqs1sgw
-
MD5
7e959b965c38ccf73416218e2272e098
-
SHA1
c6ca655662ba9be4f765c28db5d2e1b384260e58
-
SHA256
7dd7670685a7856ea0675983e14e0e103cb8f189aa0e87dfd1ea984e11c9015f
-
SHA512
032305e28bab9d39835705d6b1e5d9a2f0a3347a9bad5625867e24ddb3a07e7b3377a1095252dd90bccfb49234affd73921db7cb7fa2b4f497de69578021d6d0
-
SSDEEP
196608:/d/lOqPnih8FXj+hYeB0sKYu/PaQgKDnO8NpHzgsAGKaRZtG77CTRzbtqlKMYm0F:mqPnLFCjQpDOETgsv/GvkT6Ko0TEk
Behavioral task
behavioral1
Sample
VespyGrabber.exe
Resource
win10ltsc2021-20250314-en
Malware Config
Targets
-
-
Target
VespyGrabber.exe
-
Size
13.9MB
-
MD5
7e959b965c38ccf73416218e2272e098
-
SHA1
c6ca655662ba9be4f765c28db5d2e1b384260e58
-
SHA256
7dd7670685a7856ea0675983e14e0e103cb8f189aa0e87dfd1ea984e11c9015f
-
SHA512
032305e28bab9d39835705d6b1e5d9a2f0a3347a9bad5625867e24ddb3a07e7b3377a1095252dd90bccfb49234affd73921db7cb7fa2b4f497de69578021d6d0
-
SSDEEP
196608:/d/lOqPnih8FXj+hYeB0sKYu/PaQgKDnO8NpHzgsAGKaRZtG77CTRzbtqlKMYm0F:mqPnLFCjQpDOETgsv/GvkT6Ko0TEk
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1