General

  • Target

    Nova_RBX.zip

  • Size

    10.8MB

  • Sample

    240511-knwesahg4x

  • MD5

    59a72e4727796ffb5027e487734e814c

  • SHA1

    668c746b16710cabbc78480ac0545937bb201b2f

  • SHA256

    3dafac9512b77f34bde8a001f95f74f72a4f167b8f16a983a2b0ead1baa50c47

  • SHA512

    cf04af5d71c50cb4a7fa2dd3b1987eef11bf45c8bbf4412e76cc3e7cae42987ff4d9d1a5b1692abe4ecb5fb577e2d1f08a48b2d4ed51ef7f102486ba1371b296

  • SSDEEP

    196608:KeaMHu8raDADdxtxBAma2B/j3MSY+qEBaiOitnrUuTqZUIYUtHsw02:7aqT0IdnAR2lj8SYvoOKnrUuTqZUJ1x2

Malware Config

Targets

    • Target

      Nova_RBX.zip

    • Size

      10.8MB

    • MD5

      59a72e4727796ffb5027e487734e814c

    • SHA1

      668c746b16710cabbc78480ac0545937bb201b2f

    • SHA256

      3dafac9512b77f34bde8a001f95f74f72a4f167b8f16a983a2b0ead1baa50c47

    • SHA512

      cf04af5d71c50cb4a7fa2dd3b1987eef11bf45c8bbf4412e76cc3e7cae42987ff4d9d1a5b1692abe4ecb5fb577e2d1f08a48b2d4ed51ef7f102486ba1371b296

    • SSDEEP

      196608:KeaMHu8raDADdxtxBAma2B/j3MSY+qEBaiOitnrUuTqZUIYUtHsw02:7aqT0IdnAR2lj8SYvoOKnrUuTqZUJ1x2

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Execution

Command and Scripting Interpreter

1
T1059

PowerShell

1
T1059.001

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Process Discovery

1
T1057

Collection

Data from Local System

2
T1005

Tasks