General

  • Target

    sss.exe

  • Size

    8.2MB

  • Sample

    240529-e8645aaf7x

  • MD5

    2d20ff48288d2039ef2f8cafa525476f

  • SHA1

    67ce0911796740145a4945c5a833c0b44771e1d8

  • SHA256

    d148053b4ace5d826a91599b6d112cbb98698ef9fbdbe325c23b1618deb32678

  • SHA512

    763d1c5ee3e24e094fd819ec88eafc6cad938aad71a05cfc6e93d9beffc6a7747738fbdd97ef711ad1ef664dda6c36ec4cf77722330767845ddf81837d7d8f9f

  • SSDEEP

    196608:+rR34EzWELjv+bhqNVoB8Ck5c7GpNlpq41J2ySEcbk9qtlDfqWe:P1EL+9qz88Ck+7q3p91JmcqfqWe

Malware Config

Targets

    • Target

      sss.exe

    • Size

      8.2MB

    • MD5

      2d20ff48288d2039ef2f8cafa525476f

    • SHA1

      67ce0911796740145a4945c5a833c0b44771e1d8

    • SHA256

      d148053b4ace5d826a91599b6d112cbb98698ef9fbdbe325c23b1618deb32678

    • SHA512

      763d1c5ee3e24e094fd819ec88eafc6cad938aad71a05cfc6e93d9beffc6a7747738fbdd97ef711ad1ef664dda6c36ec4cf77722330767845ddf81837d7d8f9f

    • SSDEEP

      196608:+rR34EzWELjv+bhqNVoB8Ck5c7GpNlpq41J2ySEcbk9qtlDfqWe:P1EL+9qz88Ck+7q3p91JmcqfqWe

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks