General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    240904-zhyqaawbrp

  • MD5

    1f0a281980efab8f4f042f1951766821

  • SHA1

    a4356202728f9f7f1cafd743c3606cdfefae8512

  • SHA256

    9b25a93cbe88895f2018cfb82ba1c8552f7c566d496deebd4d7aa3648ee1c44b

  • SHA512

    2e7a8b9fe9c0967390d7eb748b1b0f8dbc961c6ee21e83a681bb5441f2da2ae8ff6ebad15eb10d0dce8e4db66da663e5bcc2bed79b500e1b15294448a340f4f1

  • SSDEEP

    98304:4WDjWM8JEE1rKYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIF6:4W0aZeNTfm/pf+xk4dWRatrbWOjgKQ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      1f0a281980efab8f4f042f1951766821

    • SHA1

      a4356202728f9f7f1cafd743c3606cdfefae8512

    • SHA256

      9b25a93cbe88895f2018cfb82ba1c8552f7c566d496deebd4d7aa3648ee1c44b

    • SHA512

      2e7a8b9fe9c0967390d7eb748b1b0f8dbc961c6ee21e83a681bb5441f2da2ae8ff6ebad15eb10d0dce8e4db66da663e5bcc2bed79b500e1b15294448a340f4f1

    • SSDEEP

      98304:4WDjWM8JEE1rKYamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIF6:4W0aZeNTfm/pf+xk4dWRatrbWOjgKQ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks