General
-
Target
WebCam.exe
-
Size
6.9MB
-
Sample
240812-njj3qsyfmn
-
MD5
8032cb92126f68780aee4c1267f9b0c0
-
SHA1
cd7c5d8f47adbfa903c169ab61dd0d8ecdfd0397
-
SHA256
127e8cb4a826bceed1bf11d5db18bc14f40196c190c1c2c5355ee6ea383bdb21
-
SHA512
c84f516778a875c722baed6a88ae15fa1b3fc1f74c9dc44ddaeb7a83fbdf7b0f72ecbbc52ef01459bae3407c5451012c995eadf716265b8b445a3ceffea5a5a2
-
SSDEEP
98304:gPDjWM8JEE1rWamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFWt:gP0veNTfm/pf+xk4dWRatrbWOjgKO
Behavioral task
behavioral1
Sample
WebCam.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
WebCam.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
rL�����.pyc
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
rL�����.pyc
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
WebCam.exe
-
Size
6.9MB
-
MD5
8032cb92126f68780aee4c1267f9b0c0
-
SHA1
cd7c5d8f47adbfa903c169ab61dd0d8ecdfd0397
-
SHA256
127e8cb4a826bceed1bf11d5db18bc14f40196c190c1c2c5355ee6ea383bdb21
-
SHA512
c84f516778a875c722baed6a88ae15fa1b3fc1f74c9dc44ddaeb7a83fbdf7b0f72ecbbc52ef01459bae3407c5451012c995eadf716265b8b445a3ceffea5a5a2
-
SSDEEP
98304:gPDjWM8JEE1rWamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIFWt:gP0veNTfm/pf+xk4dWRatrbWOjgKO
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
rL�����.pyc
-
Size
1KB
-
MD5
bc8abfc5cb212eae294ea5d04f0f52c7
-
SHA1
2137d1298f309f7a8abcffdc13f9cfb9642d2aab
-
SHA256
0237d4e5272cd1ff9fe95088b6c88e7fb34b71a54b1794c76f60fc6c367804bd
-
SHA512
601551d6bc4fcdfb5ec0ff42315129963d8260f68a5387a1217737fa6f0493dfc6e5a67451b3ef229c9e317eb7bcd0d07a65136a29addbef610526cf8339b408
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3