General

  • Target

    main.exe

  • Size

    37.4MB

  • Sample

    240505-2yrm1sbg57

  • MD5

    bf3dc7cfcf4bce28daa35920840f5f98

  • SHA1

    180bc82f1a627716105c6dc05a7b8f31fc507ba2

  • SHA256

    d93585f676d777f626b7cce213e479d4a0b9a9896c797f9176b2e7c1f8339c55

  • SHA512

    27cd5cab7d9deddebaf48de46186feaf298073b8dacf1135ef41865563de8f69b1bb6c51bbfc484072c1cf2e36dd0ad28b666dbfea19a17505e47d4a61a55a4f

  • SSDEEP

    786432:wdM77JXb1ukCDeE6q+m5jVagaIQm2qmWG/rVbNT+YNwouZtRLf:wdI1EDX6q3Am253NT+YNqt

Malware Config

Targets

    • Target

      main.exe

    • Size

      37.4MB

    • MD5

      bf3dc7cfcf4bce28daa35920840f5f98

    • SHA1

      180bc82f1a627716105c6dc05a7b8f31fc507ba2

    • SHA256

      d93585f676d777f626b7cce213e479d4a0b9a9896c797f9176b2e7c1f8339c55

    • SHA512

      27cd5cab7d9deddebaf48de46186feaf298073b8dacf1135ef41865563de8f69b1bb6c51bbfc484072c1cf2e36dd0ad28b666dbfea19a17505e47d4a61a55a4f

    • SSDEEP

      786432:wdM77JXb1ukCDeE6q+m5jVagaIQm2qmWG/rVbNT+YNwouZtRLf:wdI1EDX6q3Am253NT+YNqt

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • MilleniumRat

      MilleniumRat is a remote access trojan written in C#.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks