Resubmissions

06/09/2024, 21:52

240906-1q99qazclk 10

06/09/2024, 17:49

240906-wd5q9azgjh 10

General

  • Target

    OpenThis.exe

  • Size

    5.8MB

  • Sample

    240906-1q99qazclk

  • MD5

    e100ae8e25392c5c6f06cd025451602e

  • SHA1

    2941f70d9fc912ea1494521cfac47003baeb5a04

  • SHA256

    a3b749624977298580de701eb8e8db904d7efc146d377b248a917fb2d7d575ab

  • SHA512

    6d8bd3f961f266d87051499bdb8347bbe6e86234770ed709e92789c81d2b7108392428bc413503c301b135ae06d392e423f99dc00d94711abc6739a5b42f9cca

  • SSDEEP

    98304:pDmDSuXXO8nRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nGeI:pDmDZZRHvUWvozWOxu9kXwvdbDlA03Nq

Malware Config

Targets

    • Target

      OpenThis.exe

    • Size

      5.8MB

    • MD5

      e100ae8e25392c5c6f06cd025451602e

    • SHA1

      2941f70d9fc912ea1494521cfac47003baeb5a04

    • SHA256

      a3b749624977298580de701eb8e8db904d7efc146d377b248a917fb2d7d575ab

    • SHA512

      6d8bd3f961f266d87051499bdb8347bbe6e86234770ed709e92789c81d2b7108392428bc413503c301b135ae06d392e423f99dc00d94711abc6739a5b42f9cca

    • SSDEEP

      98304:pDmDSuXXO8nRHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6nGeI:pDmDZZRHvUWvozWOxu9kXwvdbDlA03Nq

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

MITRE ATT&CK Enterprise v15

Tasks