Resubmissions

06/08/2024, 13:10

240806-qen71azenm 9

06/08/2024, 13:02

240806-p9419szdnq 9

General

  • Target

    loader.exe

  • Size

    14.5MB

  • Sample

    240806-qen71azenm

  • MD5

    1e4234b582d5310d912560b0a01cfbf6

  • SHA1

    43bad577517ec3e2f3c5e58fe371ec1ef9e032c2

  • SHA256

    bc1f9c74c9911cb20481b96bbef84bd6c3b7f8535de2dc61750b516f3e3ec9ce

  • SHA512

    5bb4dc6025317116940926c474684ac512d015cef25df4985b551c74d4b37edafc92421bfedc843a5f185a194a51372f8fa9e667adaa1cfd049661936917be8c

  • SSDEEP

    196608:68awSa50ny7TwBuroK7l2DzYavk/WhThNucXAfO7:6lwFuy7TCDzJ8/KKoD

Malware Config

Targets

    • Target

      loader.exe

    • Size

      14.5MB

    • MD5

      1e4234b582d5310d912560b0a01cfbf6

    • SHA1

      43bad577517ec3e2f3c5e58fe371ec1ef9e032c2

    • SHA256

      bc1f9c74c9911cb20481b96bbef84bd6c3b7f8535de2dc61750b516f3e3ec9ce

    • SHA512

      5bb4dc6025317116940926c474684ac512d015cef25df4985b551c74d4b37edafc92421bfedc843a5f185a194a51372f8fa9e667adaa1cfd049661936917be8c

    • SSDEEP

      196608:68awSa50ny7TwBuroK7l2DzYavk/WhThNucXAfO7:6lwFuy7TCDzJ8/KKoD

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

MITRE ATT&CK Enterprise v15

Tasks