General

  • Target

    spyware.exe

  • Size

    6.7MB

  • Sample

    240923-k7bvgstcnm

  • MD5

    fc045f7933a229096a89b75654670462

  • SHA1

    94d268330f016e19fa0c920bbda9aa49add4faf3

  • SHA256

    fe4eb1ea9c5ea1d4869ad7f3d75b12d26f0c52e1869adf7904f02a6ab0adeb16

  • SHA512

    029a531797614bebc4dacd875bbadccc643488c90292d6311fdfb46ef61ec318b914b805b6e92ed71b3e055a7bda29fd82be221d2f67522158026fe94946cd75

  • SSDEEP

    196608:k1FbjzeN/FJMIDJf0gsAGK5SEQRJuAKO9Ad:N/Fqyf0gsfNYAKx

Malware Config

Targets

    • Target

      spyware.exe

    • Size

      6.7MB

    • MD5

      fc045f7933a229096a89b75654670462

    • SHA1

      94d268330f016e19fa0c920bbda9aa49add4faf3

    • SHA256

      fe4eb1ea9c5ea1d4869ad7f3d75b12d26f0c52e1869adf7904f02a6ab0adeb16

    • SHA512

      029a531797614bebc4dacd875bbadccc643488c90292d6311fdfb46ef61ec318b914b805b6e92ed71b3e055a7bda29fd82be221d2f67522158026fe94946cd75

    • SSDEEP

      196608:k1FbjzeN/FJMIDJf0gsAGK5SEQRJuAKO9Ad:N/Fqyf0gsfNYAKx

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks