General

  • Target

    https://github.com/dumbex6/FLASH-USDT-SENDER/archive/refs/heads/main.zip

  • Sample

    240603-kyp1raah78

Score
8/10

Malware Config

Targets

    • Target

      https://github.com/dumbex6/FLASH-USDT-SENDER/archive/refs/heads/main.zip

    Score
    8/10
    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Enterprise v15

Tasks