Resubmissions

21/09/2024, 02:01

240921-cfkz3szejf 9

20/09/2024, 22:18

240920-175qka1frm 9

General

  • Target

    SkySpoofer.exe

  • Size

    83.0MB

  • Sample

    240921-cfkz3szejf

  • MD5

    482f2df813588eeccf1a168faf02449d

  • SHA1

    b13831e78dcc84debc5e87c565d75c57654d40f7

  • SHA256

    806740796d3071184023fd7e9f3ef3f9aa5c19456b5dbcfce22f03f98a37b848

  • SHA512

    7fb6594c4aaa861e68d2a38d21670881edfeb56e50ada7be57a8eae9c1d0c02da78e724a237376af792f3a4a15bdc410a06fdc2f3a2caed77d2681ca0e7b8d18

  • SSDEEP

    786432:y9eU7SQqMoknvNpA+vIlo0FdGgvQJbTiumfSM2ocESWqEIBBqWMNWHXEF:EVeQqMrlpA+Ql45xTivfSIfqrBBJH0F

Malware Config

Targets

    • Target

      SkySpoofer.exe

    • Size

      83.0MB

    • MD5

      482f2df813588eeccf1a168faf02449d

    • SHA1

      b13831e78dcc84debc5e87c565d75c57654d40f7

    • SHA256

      806740796d3071184023fd7e9f3ef3f9aa5c19456b5dbcfce22f03f98a37b848

    • SHA512

      7fb6594c4aaa861e68d2a38d21670881edfeb56e50ada7be57a8eae9c1d0c02da78e724a237376af792f3a4a15bdc410a06fdc2f3a2caed77d2681ca0e7b8d18

    • SSDEEP

      786432:y9eU7SQqMoknvNpA+vIlo0FdGgvQJbTiumfSM2ocESWqEIBBqWMNWHXEF:EVeQqMrlpA+Ql45xTivfSIfqrBBJH0F

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks