Resubmissions

18-07-2024 09:16

240718-k8lfbavgke 1

18-07-2024 08:08

240718-j1tw2stapc 10

18-07-2024 07:59

240718-jvsf2ashka 8

18-07-2024 07:56

240718-js11dszapm 5

General

  • Target

    https://cdn.discordapp.com/attachments/1250327383010181161/1262852381390143669/maple.rar?ex=66996bee&is=66981a6e&hm=7a6f895abaea5bece50702d93920af63bd26234a6b94d043e1e69ffea03d8db6&

  • Sample

    240718-jvsf2ashka

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1250327383010181161/1262852381390143669/maple.rar?ex=66996bee&is=66981a6e&hm=7a6f895abaea5bece50702d93920af63bd26234a6b94d043e1e69ffea03d8db6&

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks