General
-
Target
loader.exe.exe
-
Size
31.2MB
-
Sample
240825-2gcsjayfmf
-
MD5
887f5264dedb4c380d5332100815e330
-
SHA1
4970c8792b5f83458b0a22d06cec24e8029468ad
-
SHA256
89be39e503f1775c7c4b4c8cff2318ce043cfa4d9d5ef47db43efee15ced4975
-
SHA512
227b978ff17510d2571c5aa0ee432f87790bbadb022d6c277cc382a8db750346add609d0eaa7965d84bfd2ae649cdf5189b89f77024dd0fcffe3b3804f67cc81
-
SSDEEP
786432:zYSZScjX3KLNNryGoWbtRrhGtLD9MYTINqnhHKpZzRlUXwouTtRL:zYSZScj3o5tGdCYTINYqp1yQt
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
loader.exe.exe
-
Size
31.2MB
-
MD5
887f5264dedb4c380d5332100815e330
-
SHA1
4970c8792b5f83458b0a22d06cec24e8029468ad
-
SHA256
89be39e503f1775c7c4b4c8cff2318ce043cfa4d9d5ef47db43efee15ced4975
-
SHA512
227b978ff17510d2571c5aa0ee432f87790bbadb022d6c277cc382a8db750346add609d0eaa7965d84bfd2ae649cdf5189b89f77024dd0fcffe3b3804f67cc81
-
SSDEEP
786432:zYSZScjX3KLNNryGoWbtRrhGtLD9MYTINqnhHKpZzRlUXwouTtRL:zYSZScj3o5tGdCYTINYqp1yQt
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3