A malware sample, identified by the hash 3c21aa482590d6d5c74551c65af1716e9c8087a0d037426e70f7504c5c3b6a03, has been analyzed by Hybrid Analysis, revealing potential connections to JavaScript execution and email collection tactics. The analysis, conducted on February 12, 2026, indicates the malware exhibits behaviors associated with MITRE ATT&CK techniques T1059.007 and T1114.
The sample was found to potentially query DNS servers and contact servers, aligning with the ATT&CK technique T1071, Application Layer Protocol Command and Control, and T1071.004, DNS Command and Control. Hybrid Analysis detected the presence of potential email addresses within the binary or its memory space. The malware also appears to engage in application layer protocol communication, potentially to evade detection.
A separate analysis of sample e3d1e910ae548dd185db9f5802bbb68438bac1872944176cf163ace38f1bf285, also conducted by Hybrid Analysis, further highlights the use of JavaScript execution (T1059.007). This sample also demonstrated characteristics related to credential access, specifically keylogging (T1056.001), with strings identified that suggest keystroke logging capabilities. File and directory discovery (T1083) was also observed, with the malware dropping a license file.
The second sample further exhibited communication patterns consistent with web-based command and control, including GET requests to web servers and communication via HTTP (T1071.001). It also contacted random domain names. Both samples demonstrate a reliance on common internet protocols for command and control, potentially blending malicious traffic with legitimate network activity.
While the analysis identifies specific ATT&CK techniques, the ultimate purpose and origin of these malware samples remain undetermined. Neither Hybrid Analysis report provides attribution or details regarding the targets of these attacks. Further investigation is required to ascertain the full scope and impact of these threats.