General

  • Target

    46a4d503b31f1dc54b9beda9a12d91b382bf491e7b354ffa3df174050b96d799.exe

  • Size

    13.9MB

  • Sample

    240924-bpfw2ssalm

  • MD5

    663678dc0bef5db3d7cd0c78aeea7625

  • SHA1

    0e5652d0e200ec9cc1f58cbdb40690e6f98a08d3

  • SHA256

    46a4d503b31f1dc54b9beda9a12d91b382bf491e7b354ffa3df174050b96d799

  • SHA512

    9f09061ce19c2cbd330f9d8e8da27b2d4d311b521426fad4ace078da801b2b2c7cdb9a4e7e17308f04fecc3c06bb293c3f5662487768fb55050c82d0bd8335cf

  • SSDEEP

    196608:uNumWJJbVdQ831Lxjo1LvQpl5myGFwy1vQRBii6cou4+LbNJp6QOjmFwDRxtYSHL:1jPys4dFFt2i/SleK2pM9B3Qvv

Malware Config

Targets

    • Target

      46a4d503b31f1dc54b9beda9a12d91b382bf491e7b354ffa3df174050b96d799.exe

    • Size

      13.9MB

    • MD5

      663678dc0bef5db3d7cd0c78aeea7625

    • SHA1

      0e5652d0e200ec9cc1f58cbdb40690e6f98a08d3

    • SHA256

      46a4d503b31f1dc54b9beda9a12d91b382bf491e7b354ffa3df174050b96d799

    • SHA512

      9f09061ce19c2cbd330f9d8e8da27b2d4d311b521426fad4ace078da801b2b2c7cdb9a4e7e17308f04fecc3c06bb293c3f5662487768fb55050c82d0bd8335cf

    • SSDEEP

      196608:uNumWJJbVdQ831Lxjo1LvQpl5myGFwy1vQRBii6cou4+LbNJp6QOjmFwDRxtYSHL:1jPys4dFFt2i/SleK2pM9B3Qvv

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks