Resubmissions

20-09-2024 08:30

240920-kekxpaxcrc 10

20-09-2024 08:28

240920-kc2gnaxfnq 10

20-09-2024 08:02

240920-jxazrswele 10

20-09-2024 07:59

240920-jvmksawdqd 10

General

  • Target

    Blox fruits exploiter.exe

  • Size

    106.9MB

  • Sample

    240920-jvmksawdqd

  • MD5

    4670c127cd49d3e38a165f30374ca33c

  • SHA1

    47f85405d1876f311efad50a84439599ef2cbdbe

  • SHA256

    e397f9f6dcb25eb9fd966567ec6517ef944a7c21b7799c1561911ecabfc8c4df

  • SHA512

    e1f507ffb8bd0a437cd11d40da29ecf1086ea51ebb10d0c57fb8d38df9c3e144d03d5409872212386e3dfe48d24f436cd803834b4a10ebe29a48aad7011b8cc4

  • SSDEEP

    3145728:DagL8iS6xjKcBa6/2qHO5izBVnG0iWMstB2Oxbjd:WKJSWNa6NHCittieB

Malware Config

Targets

    • Target

      Blox fruits exploiter.exe

    • Size

      106.9MB

    • MD5

      4670c127cd49d3e38a165f30374ca33c

    • SHA1

      47f85405d1876f311efad50a84439599ef2cbdbe

    • SHA256

      e397f9f6dcb25eb9fd966567ec6517ef944a7c21b7799c1561911ecabfc8c4df

    • SHA512

      e1f507ffb8bd0a437cd11d40da29ecf1086ea51ebb10d0c57fb8d38df9c3e144d03d5409872212386e3dfe48d24f436cd803834b4a10ebe29a48aad7011b8cc4

    • SSDEEP

      3145728:DagL8iS6xjKcBa6/2qHO5izBVnG0iWMstB2Oxbjd:WKJSWNa6NHCittieB

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks