General

  • Target

    AkameV2.bat

  • Size

    2KB

  • Sample

    240920-wqfynazflk

  • MD5

    f5a3cd3b57b5872f25bc94fabdd6a07e

  • SHA1

    a7235abf2f1ceedca81912ac8315a850e5fd7ffe

  • SHA256

    7749ac8f6e93ad67edb07680727e10001558b469410d979a0fb8ecc6862c4067

  • SHA512

    7fab5482027d94296de1dc8ec7a909533df9a261924807c24fc371fd9b21cc4818cc99e9c225a8b0fa882051fb572e0c0c7316c9200b403cd7129fd6dca12163

Malware Config

Targets

    • Target

      AkameV2.bat

    • Size

      2KB

    • MD5

      f5a3cd3b57b5872f25bc94fabdd6a07e

    • SHA1

      a7235abf2f1ceedca81912ac8315a850e5fd7ffe

    • SHA256

      7749ac8f6e93ad67edb07680727e10001558b469410d979a0fb8ecc6862c4067

    • SHA512

      7fab5482027d94296de1dc8ec7a909533df9a261924807c24fc371fd9b21cc4818cc99e9c225a8b0fa882051fb572e0c0c7316c9200b403cd7129fd6dca12163

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Command and Scripting Interpreter: PowerShell

      Powershell Invoke Web Request.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks