General

  • Target

    Nexus.exe

  • Size

    6.9MB

  • Sample

    240608-ybtbjsga22

  • MD5

    4c387084af4f8ca5e788a9ce34ce60f0

  • SHA1

    8eba53e02266b4f8758f0452b2aaac1e694fb231

  • SHA256

    905baec4d70f9e1b1f8f0a6377de9d50b54e34489888de800e03c8de2a9fb97a

  • SHA512

    07530826cf9eb8affb3684029f2ae042f6a6b4faecf78520594cb4138b47d231fe334a9baa4d903998265b0bad67bbaf891bb5ed59e1ce27d566c75ae6b59227

  • SSDEEP

    98304:wrrBYzdbM+Q2y+aq0FrjOjFgFQlwq4Mjk+dBZtu9xTtwz/aer6/BbQEJ1nL2hBnm:wrrIf0FfOjmFQR4MVGFtwLPCnL2hVcR

Malware Config

Targets

    • Target

      Nexus.exe

    • Size

      6.9MB

    • MD5

      4c387084af4f8ca5e788a9ce34ce60f0

    • SHA1

      8eba53e02266b4f8758f0452b2aaac1e694fb231

    • SHA256

      905baec4d70f9e1b1f8f0a6377de9d50b54e34489888de800e03c8de2a9fb97a

    • SHA512

      07530826cf9eb8affb3684029f2ae042f6a6b4faecf78520594cb4138b47d231fe334a9baa4d903998265b0bad67bbaf891bb5ed59e1ce27d566c75ae6b59227

    • SSDEEP

      98304:wrrBYzdbM+Q2y+aq0FrjOjFgFQlwq4Mjk+dBZtu9xTtwz/aer6/BbQEJ1nL2hBnm:wrrIf0FfOjmFQR4MVGFtwLPCnL2hVcR

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks