General

  • Target

    CombatV3 3.3.exe

  • Size

    6.9MB

  • Sample

    240623-nqtkrayhnc

  • MD5

    bbe4c555e10ddd875b77fb3a34544769

  • SHA1

    8aeeb8a80605b102f88bc9ede5dbd8b2dde9dfdd

  • SHA256

    3f9c65746ff7d76f1f5fcea2a43a1d1e53e2fdf515d89e408e32d8281f1bb98c

  • SHA512

    d87e053b8df3db95329ab0ad6c96d75cc2fb34e6d7719f84fb5a67c78dda3401d50ec707dcffeffe3107d85bd9973f088e45b41625040b8812c91cccb23b0f0f

  • SSDEEP

    98304:LtkwN+MdA5wqM+0L8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLV:LtV1iB6ylnlPzf+JiJCsmFMvcn6hVvB

Malware Config

Targets

    • Target

      CombatV3 3.3.exe

    • Size

      6.9MB

    • MD5

      bbe4c555e10ddd875b77fb3a34544769

    • SHA1

      8aeeb8a80605b102f88bc9ede5dbd8b2dde9dfdd

    • SHA256

      3f9c65746ff7d76f1f5fcea2a43a1d1e53e2fdf515d89e408e32d8281f1bb98c

    • SHA512

      d87e053b8df3db95329ab0ad6c96d75cc2fb34e6d7719f84fb5a67c78dda3401d50ec707dcffeffe3107d85bd9973f088e45b41625040b8812c91cccb23b0f0f

    • SSDEEP

      98304:LtkwN+MdA5wqM+0L8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLV:LtV1iB6ylnlPzf+JiJCsmFMvcn6hVvB

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks