General

  • Target

    release.exe

  • Size

    5.9MB

  • Sample

    240522-alt4tsee77

  • MD5

    6d46969ab9ba73f9c14cb57c8911f492

  • SHA1

    f65f0a1aa15eaec933b320fd0f6bdc59535f6d28

  • SHA256

    2edfd48c7fc7f707fe235d05551b61a882296b5b9097e79823219bc0cde8f90a

  • SHA512

    f93a65d80ca72813e0381e4c014e7f1ac913e1cdff652ce0fa1511cf24c87e33d2011ff6b05fe3f65341355c7c20704196bd4510f5357bf40a079dc1abf8ea82

  • SSDEEP

    98304:WrOVmoDUN43WlaEjjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aBn4:WrOVumWzOjmFwDRxtYSHdK34kdai7bNp

Malware Config

Targets

    • Target

      release.exe

    • Size

      5.9MB

    • MD5

      6d46969ab9ba73f9c14cb57c8911f492

    • SHA1

      f65f0a1aa15eaec933b320fd0f6bdc59535f6d28

    • SHA256

      2edfd48c7fc7f707fe235d05551b61a882296b5b9097e79823219bc0cde8f90a

    • SHA512

      f93a65d80ca72813e0381e4c014e7f1ac913e1cdff652ce0fa1511cf24c87e33d2011ff6b05fe3f65341355c7c20704196bd4510f5357bf40a079dc1abf8ea82

    • SSDEEP

      98304:WrOVmoDUN43WlaEjjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aBn4:WrOVumWzOjmFwDRxtYSHdK34kdai7bNp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks