General
-
Target
TDpremium (3).exe
-
Size
19.0MB
-
Sample
240913-ydc3cavgqc
-
MD5
e9bfbba5a329a935b557d0e86b2a4cff
-
SHA1
61ffb01f770df1da7fe4f0ab7a7a574881c05949
-
SHA256
22c9c5f83c825e9d58048ee71f805ce27367d43b25c360ff80e3dd2a1788cc86
-
SHA512
806a4d4b3d24d66543d03801961b7d8acef97cc2fc9c8b1a28ca7ad0ef3c4974924ca73bb2fcce1fa97e57c9e21707eb66b12def8c5b5dae8894890661eaee4c
-
SSDEEP
196608:u00cDeH8Ljv+bhqNVoBKUh8mz4Iv9Pfu1D7k:CieHsL+9qz8/b4IBuRk
Behavioral task
behavioral1
Sample
TDpremium (3).exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://discord.gg/W88VBvzVg9',
Targets
-
-
Target
TDpremium (3).exe
-
Size
19.0MB
-
MD5
e9bfbba5a329a935b557d0e86b2a4cff
-
SHA1
61ffb01f770df1da7fe4f0ab7a7a574881c05949
-
SHA256
22c9c5f83c825e9d58048ee71f805ce27367d43b25c360ff80e3dd2a1788cc86
-
SHA512
806a4d4b3d24d66543d03801961b7d8acef97cc2fc9c8b1a28ca7ad0ef3c4974924ca73bb2fcce1fa97e57c9e21707eb66b12def8c5b5dae8894890661eaee4c
-
SSDEEP
196608:u00cDeH8Ljv+bhqNVoBKUh8mz4Iv9Pfu1D7k:CieHsL+9qz8/b4IBuRk
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3