General

  • Target

    aimassisttest.exe

  • Size

    694KB

  • Sample

    240509-a6ws6abe25

  • MD5

    d80f020bddcb97b95fda92c49d90fe14

  • SHA1

    4784e925aa4baa90f0de62f3a775c04ec2b9a6f5

  • SHA256

    9a5850a5a14e84fd7953672ab84ac973d1ee07e85b6bf5702b2a581969a66b52

  • SHA512

    83deb65171cbfe4078c772687f466efc8e52344fce8a5377bf29eccd528f9d8b27453a5423e5a9e91e4af9e8ec7ec72ef08be08651bfe0faddea74cdd8a8c1fa

  • SSDEEP

    12288:oU+9H3900EJqrekLEyTYQcDL/TNuUCziP6VFGO5lrEaKYNtcBvAuvlee2NCFbLkH:oU+9XNrenyktDLdYNtcdvQNC9wHAP5cX

Malware Config

Targets

    • Target

      aimassisttest.exe

    • Size

      694KB

    • MD5

      d80f020bddcb97b95fda92c49d90fe14

    • SHA1

      4784e925aa4baa90f0de62f3a775c04ec2b9a6f5

    • SHA256

      9a5850a5a14e84fd7953672ab84ac973d1ee07e85b6bf5702b2a581969a66b52

    • SHA512

      83deb65171cbfe4078c772687f466efc8e52344fce8a5377bf29eccd528f9d8b27453a5423e5a9e91e4af9e8ec7ec72ef08be08651bfe0faddea74cdd8a8c1fa

    • SSDEEP

      12288:oU+9H3900EJqrekLEyTYQcDL/TNuUCziP6VFGO5lrEaKYNtcBvAuvlee2NCFbLkH:oU+9XNrenyktDLdYNtcdvQNC9wHAP5cX

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks