General

  • Target

    loader.exe

  • Size

    76.9MB

  • Sample

    240914-1tg3caydrl

  • MD5

    c36f2591201fc0e9cecf76b8b3332786

  • SHA1

    c41e1c2ede2256764c4741833d2b6195c5260d77

  • SHA256

    28ac6ec93b5282c62194d78a42e2d74c3ecea0949ba4f1d0530acbf50a8c33a6

  • SHA512

    415e34d8b49681f91a9fb3fe421f14f6ce680eb2444a8cbe95197fe180dbc95af7c163dc6e92dd15ae3fba9c7ac85fae84c38eb2ec6d7fde22b866519b25bf3d

  • SSDEEP

    1572864:PvHcRl3W8mSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdghhEmSNOV3hC:PvHcR5hmSkB05awcf2dMpuFhfg

Malware Config

Targets

    • Target

      loader.exe

    • Size

      76.9MB

    • MD5

      c36f2591201fc0e9cecf76b8b3332786

    • SHA1

      c41e1c2ede2256764c4741833d2b6195c5260d77

    • SHA256

      28ac6ec93b5282c62194d78a42e2d74c3ecea0949ba4f1d0530acbf50a8c33a6

    • SHA512

      415e34d8b49681f91a9fb3fe421f14f6ce680eb2444a8cbe95197fe180dbc95af7c163dc6e92dd15ae3fba9c7ac85fae84c38eb2ec6d7fde22b866519b25bf3d

    • SSDEEP

      1572864:PvHcRl3W8mSk8IpG7V+VPhqYdfzE7tlHegiYweyJulZUdghhEmSNOV3hC:PvHcR5hmSkB05awcf2dMpuFhfg

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      discord_token_grabber.pyc

    • Size

      15KB

    • MD5

      a421e5a17a0f7654cb09fd386ac20866

    • SHA1

      e649c16ca644d278f16919353105d677bad964cf

    • SHA256

      5e4e71264969d2b91460300830ff3100811e6a43318065ca82e90469b7c944dd

    • SHA512

      193289e6bc067f0e5f83db67e555ece15718411c1352e634252a2dca6aa527fd292b65e7e13a28838949f37bcbf9cee99cf2b3f2933d2effc52c8dc2fb113cff

    • SSDEEP

      384:YGC7RYmnXavEGP3ltcrhntQ5saa2holHVA:YGCuvEoltcrttQ5saaCgHVA

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      9KB

    • MD5

      b3e069a6d0520f658a3fd652a6e51ca0

    • SHA1

      3e2590a43b110ec23dbbe4e55145c6f1cd27800e

    • SHA256

      232fb80756e38b78775ec75d7ee46d15ac394ed7d197b577b2c98dd00709b007

    • SHA512

      54a3cc21d321003808c2e1b9d52c06738ea0c80842d57ed754b05ff493157b22805a4d484bc46804d83ec052db535ceeb79708087355103cf75e3d2c9e0ce5bb

    • SSDEEP

      192:kNal3eiNis9QfUF2x3NC79F211G67+EtAhN:kJiB2XtF7jKkAhN

    Score
    3/10
    • Target

      misc.pyc

    • Size

      4KB

    • MD5

      3af0657bf4d2cdcd8e84aeee71be06f7

    • SHA1

      bd28a025931e96da24c9818e1a1648d2ce7f5212

    • SHA256

      83bbb656424fab009b612232bab4970a8bd49c944285975babb3de8f99db9da6

    • SHA512

      a402b759e427ed78e55650b9188772916787a1734f5dd5a5782d98228c7c9da11057627bcad29aa94139a9c20b1c4ca2e8c92983b38384245855f6da3369dace

    • SSDEEP

      96:ySMlhlvyz7DweHPF8+VB7sHIZGQSWfvmyyZ1k9qHub:Lolvyzgevq+VBXZGQlvmV1kkHub

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      7KB

    • MD5

      91bebfc811f4706852fc415d7b2cc836

    • SHA1

      26a7645c5b2590a29bb403cb7be00c3ad5e575b3

    • SHA256

      fb77fa8b2407db4127a67e37188e0d722c981280b605f6173d737f39e3582dce

    • SHA512

      1e5ad7a82f60df0d8bc048ff31ca716cc93d1e167ef9f53e916a608b5a7709f884b657854848a9b6e586f994c010f00dba55c9c76f864b93594ff2ce9fddbadd

    • SSDEEP

      192:h114qWLfhuUIxDPK2cxDJb+XUhitovgEuz:V4qWLfMFyVxDAE/4

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      172KB

    • MD5

      7ac88efa76a0fd682f15ebec7533ab61

    • SHA1

      4dd27eca0ad7f6a6c8b3ea12997d286dde5bafb0

    • SHA256

      4be9752ee3b238c028cba62c7a577c339100f8cf27994c17ecf32c063a98e394

    • SHA512

      fd69f0e6c6188f96054b8668191ae2313a340c0ed384068f7fb15fca88aaa94dafb265dfcaf13a7384f7dd8df2619562462e9bed100631ac6cdf61b4979ec42b

    • SSDEEP

      3072:CFfkHkP0aOO/JM1w17VoOPZTw0I1ScQaQV+yGIvdXzc2sTWn:CTP0aOO/JMiVoGIoREyzsM

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks