General

  • Target

    Hexxedclient.rar

  • Size

    6.8MB

  • Sample

    240802-wa7fnstbrn

  • MD5

    313aadd46e5bb2051152fad06c1a86dc

  • SHA1

    de5b453e0a25003c2f2de00ba006742f2105b34f

  • SHA256

    7206ecadf0d099a6387726ad78577eb3f2c46b155fa5bed9642b5a8160f40ff1

  • SHA512

    525ce52461a003c557642f6b958e15bf78ce32a6b724d7d530286531d2e57f6021225b511041808a92303d81866a9839514a408fe6cb67429bfb3d3ba91c4a18

  • SSDEEP

    98304:a99h83HpHdJ6Csbs0QjszItd36htR9s2c6W3svJWuCqzh9R+/k0zp4u6wurLLa4e:Ky3HpCCsbS33U9sncxWi0/kc4unMa7

Malware Config

Targets

    • Target

      Hexxedclient.exe

    • Size

      7.0MB

    • MD5

      36b73f679e19648794cdd0f9d26161b2

    • SHA1

      cb0d167e00117cf4405e281e39be722264021305

    • SHA256

      8de3d83c8da7be0827042b335b99a63f75fddca8646f2ad4ead12bea2b4f47b9

    • SHA512

      a73682aa0644ec58bf98fe810c50de8181e1f652f604d5c9636683c9998d05e9ae71e36696317ff7d8862dc61221558025ed281c37bacf9fde3fcc819097509d

    • SSDEEP

      98304:3r5CzHqdVfB2FS27wryuT/9vUIdD9C+z3zO917vOTh+ezDNh7xvmJ1nmOBN9n4me:3r56QsebT/9bvLz3S1bA3zgn97vg

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks