General

  • Target

    phantom.exe

  • Size

    8.6MB

  • Sample

    240817-ql7mxsxekc

  • MD5

    cbaa7a0260f3deee8f352a536f2662d7

  • SHA1

    33fd92789d684c7e92afc987ea3ad433633130e8

  • SHA256

    63e108e2d66c3b17ad885c7dba006ce1690e5d9ae2157e7cab55b42452d018b6

  • SHA512

    cb94b89aafb9369a37d23181e221000f7ba205dce3d5ae75b5052d8b25f589c88031896a428fef76a87dc62b33054fb96ccb2d86e60787e08c87790b9dfc765c

  • SSDEEP

    196608:wHGV231BKA1HeT39IigwRTet4Q4GH5lLNsIFyzWGPMYnN9uf:iGV2Xj1+TtIiFRSNNsIMzWGPTNG

Malware Config

Targets

    • Target

      phantom.exe

    • Size

      8.6MB

    • MD5

      cbaa7a0260f3deee8f352a536f2662d7

    • SHA1

      33fd92789d684c7e92afc987ea3ad433633130e8

    • SHA256

      63e108e2d66c3b17ad885c7dba006ce1690e5d9ae2157e7cab55b42452d018b6

    • SHA512

      cb94b89aafb9369a37d23181e221000f7ba205dce3d5ae75b5052d8b25f589c88031896a428fef76a87dc62b33054fb96ccb2d86e60787e08c87790b9dfc765c

    • SSDEEP

      196608:wHGV231BKA1HeT39IigwRTet4Q4GH5lLNsIFyzWGPMYnN9uf:iGV2Xj1+TtIiFRSNNsIMzWGPTNG

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks