Resubmissions

25/08/2024, 14:42

240825-r29yna1dnp 9

25/08/2024, 14:16

240825-rlgl6sycme 9

General

  • Target

    BetaGameTester_MALWARE_DO_NOT_RUN.zip

  • Size

    88.1MB

  • Sample

    240825-r29yna1dnp

  • MD5

    0af629df8eb8475dc77da9212e43d405

  • SHA1

    e043cfe548cbbbb8c250d2fbcc1f550c508b19cf

  • SHA256

    543d09f282d15e773c40af1755c0b496d73127e24e4af5f6860f2c351e5ebcf5

  • SHA512

    300a5d8572c09d850b4797e5819372b86ad1babf83d319cbcc2c93703f87bff4f0a28928685bc78f3a032693dfc9d6d2736f6bc307d919937b18d43a9cd498dc

  • SSDEEP

    1572864:Dz4SqHRfB7P31Pb2yDnADSZldL+JnV4ZpLdJrZGKfxdpWc5Jr5Ejp2Un1Cvirm65:DMSqfoyDnAOZvLweL/dGKxn5R+9noKh5

Malware Config

Targets

    • Target

      BetaGameTester_MALWARE_DO_NOT_RUN.zip

    • Size

      88.1MB

    • MD5

      0af629df8eb8475dc77da9212e43d405

    • SHA1

      e043cfe548cbbbb8c250d2fbcc1f550c508b19cf

    • SHA256

      543d09f282d15e773c40af1755c0b496d73127e24e4af5f6860f2c351e5ebcf5

    • SHA512

      300a5d8572c09d850b4797e5819372b86ad1babf83d319cbcc2c93703f87bff4f0a28928685bc78f3a032693dfc9d6d2736f6bc307d919937b18d43a9cd498dc

    • SSDEEP

      1572864:Dz4SqHRfB7P31Pb2yDnADSZldL+JnV4ZpLdJrZGKfxdpWc5Jr5Ejp2Un1Cvirm65:DMSqfoyDnAOZvLweL/dGKxn5R+9noKh5

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks