Resubmissions

29/05/2024, 11:35

240529-nqe3csdg74 10

29/05/2024, 11:34

240529-npqsgadg57 10

General

  • Target

    MagnusNightV6.exe

  • Size

    7.3MB

  • Sample

    240529-npqsgadg57

  • MD5

    9c6753dc5c8105888e74b8bbb1f3cb2b

  • SHA1

    c0462a45240c90debfe879a4202b5041f4c9fa4c

  • SHA256

    abadb91aef6f3f4f2dfdfaeb726fd86db82a9d5e31a2ff7749fd875baab67bfc

  • SHA512

    9aba4119aa0dc9da8a8204ca181fae7d080c898e3aa31126f61b35e19cb3840eb25666b48d116da8c8389eae8c9017a27cd5441db45edc1ed18b8c6a03d2834f

  • SSDEEP

    196608:krpkYS6bOshoKMuIkhVastRL5Di3uh1D7Jm:7YSuOshouIkPftRL54YRJm

Malware Config

Targets

    • Target

      MagnusNightV6.exe

    • Size

      7.3MB

    • MD5

      9c6753dc5c8105888e74b8bbb1f3cb2b

    • SHA1

      c0462a45240c90debfe879a4202b5041f4c9fa4c

    • SHA256

      abadb91aef6f3f4f2dfdfaeb726fd86db82a9d5e31a2ff7749fd875baab67bfc

    • SHA512

      9aba4119aa0dc9da8a8204ca181fae7d080c898e3aa31126f61b35e19cb3840eb25666b48d116da8c8389eae8c9017a27cd5441db45edc1ed18b8c6a03d2834f

    • SSDEEP

      196608:krpkYS6bOshoKMuIkhVastRL5Di3uh1D7Jm:7YSuOshouIkPftRL54YRJm

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks