General

  • Target

    Dream Advanced.exe

  • Size

    9.3MB

  • Sample

    240621-b2bg4avejc

  • MD5

    65e205345d28d4c2584339d86256050c

  • SHA1

    09b44b17207b38069146b06aab82b184dc49f73a

  • SHA256

    009a6d2909157654b073bd642d64a4129c4a4b5415a76b9cc2266862dfaa40c2

  • SHA512

    84e28bf823a8a5dd64516dd1fcf1c30d936e43cf63275383d1746f26908a9f7c6cea651460a14f59a6950384adadcc873500542f8e27d6cbd7fb01ef4529d693

  • SSDEEP

    196608:DrIEFItY+sJxZa0HthFhP2eN/FJMIDJf0gsAGK4RouAKPFb6a:KtLsJza0HJ9p/Fqyf0gstDAKB

Malware Config

Targets

    • Target

      Dream Advanced.exe

    • Size

      9.3MB

    • MD5

      65e205345d28d4c2584339d86256050c

    • SHA1

      09b44b17207b38069146b06aab82b184dc49f73a

    • SHA256

      009a6d2909157654b073bd642d64a4129c4a4b5415a76b9cc2266862dfaa40c2

    • SHA512

      84e28bf823a8a5dd64516dd1fcf1c30d936e43cf63275383d1746f26908a9f7c6cea651460a14f59a6950384adadcc873500542f8e27d6cbd7fb01ef4529d693

    • SSDEEP

      196608:DrIEFItY+sJxZa0HthFhP2eN/FJMIDJf0gsAGK4RouAKPFb6a:KtLsJza0HJ9p/Fqyf0gstDAKB

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks