General
-
Target
downloading.exe
-
Size
8.5MB
-
Sample
240924-j6epbaxbml
-
MD5
713bc1e62e0c4621a8ee9da1f1a13284
-
SHA1
d728832a589bf5d56c60d5448b0e767e215f9055
-
SHA256
06af71186ea86ed3c9509f0ac0493a7dd3a51d920c777a690b404429e7fc411e
-
SHA512
a3ac7751ac97861255b351526d29af92e92a512c88987505ca32be43fe001fe1b5afa6c69e2c1ce11877ae753f42723f5aaba40803ccc38f8d0be3ab05e59384
-
SSDEEP
196608:mJ09VuurErvI9pWjgfPvzm6gspQhE14AZ:IUcurEUWjC3zDQh04AZ
Behavioral task
behavioral1
Sample
downloading.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
downloading.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
downloading.exe
-
Size
8.5MB
-
MD5
713bc1e62e0c4621a8ee9da1f1a13284
-
SHA1
d728832a589bf5d56c60d5448b0e767e215f9055
-
SHA256
06af71186ea86ed3c9509f0ac0493a7dd3a51d920c777a690b404429e7fc411e
-
SHA512
a3ac7751ac97861255b351526d29af92e92a512c88987505ca32be43fe001fe1b5afa6c69e2c1ce11877ae753f42723f5aaba40803ccc38f8d0be3ab05e59384
-
SSDEEP
196608:mJ09VuurErvI9pWjgfPvzm6gspQhE14AZ:IUcurEUWjC3zDQh04AZ
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Blocklisted process makes network request
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Peripheral Device Discovery
1Process Discovery
1Query Registry
2System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Wi-Fi Discovery
1