General

  • Target

    SonicX_Executor.zip

  • Size

    19.5MB

  • Sample

    240515-ng65gsfb66

  • MD5

    fa3f48ad811854c852b8cf51c68f745c

  • SHA1

    99141c82d431cfb77abf03cb1d1a872271028539

  • SHA256

    e09786736b94a59006103aec78bc3d5ebd618e6286450cc6e1f83c6ae7b2429e

  • SHA512

    7efd28f174efdd6ffdf8054d824ddf3596366188f49e1ab79a7c53ff0c15dd3905e775e9fc0b47075cd335395ebfb5a915f3dc88b61531b566de5facb35e1467

  • SSDEEP

    393216:LPIbbz+YarfWV4F5JoRBUq9y+yNOcOiBFWmmVM+TEIaVtMonOWHAu8vfU0nSnE:zIbf+YazhFf8KTNOcOSUS7Vuon/A+nE

Malware Config

Targets

    • Target

      SonicX/SonicX.exe

    • Size

      5.9MB

    • MD5

      38a115b41e35e5dcb341a6e445cb1dfe

    • SHA1

      fa320754186beaca0ba664c3df85dd075c936d43

    • SHA256

      8a1d56f85b8f68ae8a3c1a11ca252036106234b6923656718e5175992fdfd536

    • SHA512

      3b89091482494c94f50e0104045d03eb542d38cb438a81a8057701b68239673552fcfff9e64c8e437dec5f7bb2e7e4c48d3d78704e7873467379ac22c6c1c5db

    • SSDEEP

      98304:CrInld9hjki65sn6Wfz7pnxC/tEC8smLhsl9Qvr/kAXjzrgyOSsJRynM6iIskrls:CrInr9cDOYyCREhS0kypnFnM6TsCsnUK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks