General
-
Target
start.bat
-
Size
7.6MB
-
Sample
240806-3kshtstgrn
-
MD5
8157eea4d9e3477ce91b5afea1f3c89a
-
SHA1
bb893563c5c341872237ef3c06cfdce80d811c71
-
SHA256
1c20c38088c3b36b378c4492c1ae55c6f666a462257dc36c66b9cdacfeb8d1b6
-
SHA512
27649e012a3608fb67fb8eea9798274c73aa26202bebc36e434dcf4144fb63da989e29f4288133e05c1a6e340957e90ec2df891d3307d7d0827527830d11de5e
-
SSDEEP
98304:BHDjWM8JEClk1rOamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRaYKJJC:BH08eNTfm/pf+xk4dNSESRatrbWOjgK2
Behavioral task
behavioral1
Sample
start.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
start.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
���b�.pyc
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
���b�.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
start.bat
-
Size
7.6MB
-
MD5
8157eea4d9e3477ce91b5afea1f3c89a
-
SHA1
bb893563c5c341872237ef3c06cfdce80d811c71
-
SHA256
1c20c38088c3b36b378c4492c1ae55c6f666a462257dc36c66b9cdacfeb8d1b6
-
SHA512
27649e012a3608fb67fb8eea9798274c73aa26202bebc36e434dcf4144fb63da989e29f4288133e05c1a6e340957e90ec2df891d3307d7d0827527830d11de5e
-
SSDEEP
98304:BHDjWM8JEClk1rOamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRaYKJJC:BH08eNTfm/pf+xk4dNSESRatrbWOjgK2
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
���b�.pyc
-
Size
1KB
-
MD5
2c1e5d7e1a7ba52793111d67f6da0c7e
-
SHA1
0cbf9f6d314c323623ad053e449c19b4e948fd11
-
SHA256
1ec72014616c49753cb10afc9b7b6360696256fc0b0814843bde425816b9833a
-
SHA512
3b4581ce57a2921356913e3fdd857e4a98877dd35751082db64164d756b8c1bc7cb4a2aeaee797c5765fddb1dc5672e3e43a3d3ed255499fc2b71236d33e1aa6
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3