General
-
Target
BetaGameTester_MALWARE_DO_NOT_RUN.zip
-
Size
88.1MB
-
Sample
240825-r29yna1dnp
-
MD5
0af629df8eb8475dc77da9212e43d405
-
SHA1
e043cfe548cbbbb8c250d2fbcc1f550c508b19cf
-
SHA256
543d09f282d15e773c40af1755c0b496d73127e24e4af5f6860f2c351e5ebcf5
-
SHA512
300a5d8572c09d850b4797e5819372b86ad1babf83d319cbcc2c93703f87bff4f0a28928685bc78f3a032693dfc9d6d2736f6bc307d919937b18d43a9cd498dc
-
SSDEEP
1572864:Dz4SqHRfB7P31Pb2yDnADSZldL+JnV4ZpLdJrZGKfxdpWc5Jr5Ejp2Un1Cvirm65:DMSqfoyDnAOZvLweL/dGKxn5R+9noKh5
Static task
static1
Behavioral task
behavioral1
Sample
BetaGameTester_MALWARE_DO_NOT_RUN.zip
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
BetaGameTester_MALWARE_DO_NOT_RUN.zip
-
Size
88.1MB
-
MD5
0af629df8eb8475dc77da9212e43d405
-
SHA1
e043cfe548cbbbb8c250d2fbcc1f550c508b19cf
-
SHA256
543d09f282d15e773c40af1755c0b496d73127e24e4af5f6860f2c351e5ebcf5
-
SHA512
300a5d8572c09d850b4797e5819372b86ad1babf83d319cbcc2c93703f87bff4f0a28928685bc78f3a032693dfc9d6d2736f6bc307d919937b18d43a9cd498dc
-
SSDEEP
1572864:Dz4SqHRfB7P31Pb2yDnADSZldL+JnV4ZpLdJrZGKfxdpWc5Jr5Ejp2Un1Cvirm65:DMSqfoyDnAOZvLweL/dGKxn5R+9noKh5
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1