Resubmissions

25/08/2024, 15:08

240825-shylyssbrq 7

25/08/2024, 13:51

240825-q53hbayhkq 9

General

  • Target

    BetaGameTester_orig.exe

  • Size

    88.1MB

  • Sample

    240825-q53hbayhkq

  • MD5

    f23ee7d8d8a9e230d6afef168e67c445

  • SHA1

    3826478833c17c50e9791bea60d995bc7577359f

  • SHA256

    f1c43d4b339de69f9d2c8d01d719910ffe1e323b3fa1458cba6858a6bbd91dc0

  • SHA512

    f55290b0bb4c0be6b503acdf2c1b601f230fdeef9da2d643c4f10c3f09aee55631d079c443e812c8a7cd8d03026046771c102863d238b115334ab409c8c54df5

  • SSDEEP

    1572864:rQ+e4h7TL9BHVtLM+PXFz4hb1wCXNpzMhHPrN5l4aR9zH6WVlhvKdXaeRR25QPWo:rBe4NY+PXFMhJwC9WPZL4U93V3idDsex

Malware Config

Targets

    • Target

      BetaGameTester_orig.exe

    • Size

      88.1MB

    • MD5

      f23ee7d8d8a9e230d6afef168e67c445

    • SHA1

      3826478833c17c50e9791bea60d995bc7577359f

    • SHA256

      f1c43d4b339de69f9d2c8d01d719910ffe1e323b3fa1458cba6858a6bbd91dc0

    • SHA512

      f55290b0bb4c0be6b503acdf2c1b601f230fdeef9da2d643c4f10c3f09aee55631d079c443e812c8a7cd8d03026046771c102863d238b115334ab409c8c54df5

    • SSDEEP

      1572864:rQ+e4h7TL9BHVtLM+PXFz4hb1wCXNpzMhHPrN5l4aR9zH6WVlhvKdXaeRR25QPWo:rBe4NY+PXFMhJwC9WPZL4U93V3idDsex

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Disables Task Manager via registry modification

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks