Resubmissions

29/08/2024, 12:35

240829-psnmys1hnc 9

29/08/2024, 12:31

240829-pp9e9atdkn 9

29/08/2024, 12:27

240829-pmvjba1fkh 9

General

  • Target

    rename_me.exe

  • Size

    37.7MB

  • Sample

    240829-pmvjba1fkh

  • MD5

    93d26d331039b7f093bdb585f029b6fa

  • SHA1

    a5f63edb93d3e6549e5946515cbeb9264f61266d

  • SHA256

    215da8be136603048d2f5940a86ab36c6dc9cfb833e756d8e9fac948b4235038

  • SHA512

    80ae3096926db8c352c34777a6069c91599718308b1d7a5829429b2d4c915786a74e814a04088c7d1232654d74f9432d622dea707784a8e8b30196cd70c34745

  • SSDEEP

    393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mg/96l+ZArYsFRluPt:R3on1HvSzxAMN/FZArYs2Pv07OZSA

Malware Config

Targets

    • Target

      rename_me.exe

    • Size

      37.7MB

    • MD5

      93d26d331039b7f093bdb585f029b6fa

    • SHA1

      a5f63edb93d3e6549e5946515cbeb9264f61266d

    • SHA256

      215da8be136603048d2f5940a86ab36c6dc9cfb833e756d8e9fac948b4235038

    • SHA512

      80ae3096926db8c352c34777a6069c91599718308b1d7a5829429b2d4c915786a74e814a04088c7d1232654d74f9432d622dea707784a8e8b30196cd70c34745

    • SSDEEP

      393216:RQgHDlanaGBXvDKtz+bhPWES4tiNQPNrIKc4gaPbUAgrO4mg/96l+ZArYsFRluPt:R3on1HvSzxAMN/FZArYs2Pv07OZSA

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Hide Artifacts: Hidden Window

      Windows that would typically be displayed when an application carries out an operation can be hidden.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • An obfuscated cmd.exe command-line is typically used to evade detection.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks