General
-
Target
https://href.li/?https://cdn.discordapp.com/attachments/1280286856440971324/1280804146035036170/---Latest--Set-up--pAscodE-9192--.zip?ex=66d96950&is=66d817d0&hm=7c4e3bbe47e86100290b3a7c12c9efba6abffb2c63e1401daa97ad243dbaab90&
-
Sample
240905-cw1eps1fkn
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://href.li/?https://cdn.discordapp.com/attachments/1280286856440971324/1280804146035036170/---Latest--Set-up--pAscodE-9192--.zip?ex=66d96950&is=66d817d0&hm=7c4e3bbe47e86100290b3a7c12c9efba6abffb2c63e1401daa97ad243dbaab90&
Resource
win10-20240404-en
Malware Config
Extracted
cryptbot
forv14sr.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Targets
-
-
Target
https://href.li/?https://cdn.discordapp.com/attachments/1280286856440971324/1280804146035036170/---Latest--Set-up--pAscodE-9192--.zip?ex=66d96950&is=66d817d0&hm=7c4e3bbe47e86100290b3a7c12c9efba6abffb2c63e1401daa97ad243dbaab90&
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1