General

  • Target

    HyperionSuspender.exe

  • Size

    6.6MB

  • Sample

    240929-qh282awbml

  • MD5

    b23219566203f342fc66d552e13fca4f

  • SHA1

    bb8a57b84999f0cb5a47c998b55d08dc3ba5cb12

  • SHA256

    7b66d1563cdf73db6dd592c207fd25be645bf6827ea52ccb069ef881a63efa2e

  • SHA512

    17971b1383a766a3f187ddb14c54b9b88ed2d2a3ab2cc00e42c11eca7ea4169cbc46b6a74957405d1f24c036f761bc8000abc0b39944ba9afbd70b0874bf751f

  • SSDEEP

    196608:qAAMvf+ysDBPI4sWHqVcUzAoNfovSEYCn3ZJetiOohU0:vqEIqVcUzAoN9u3MMF

Malware Config

Targets

    • Target

      HyperionSuspender.exe

    • Size

      6.6MB

    • MD5

      b23219566203f342fc66d552e13fca4f

    • SHA1

      bb8a57b84999f0cb5a47c998b55d08dc3ba5cb12

    • SHA256

      7b66d1563cdf73db6dd592c207fd25be645bf6827ea52ccb069ef881a63efa2e

    • SHA512

      17971b1383a766a3f187ddb14c54b9b88ed2d2a3ab2cc00e42c11eca7ea4169cbc46b6a74957405d1f24c036f761bc8000abc0b39944ba9afbd70b0874bf751f

    • SSDEEP

      196608:qAAMvf+ysDBPI4sWHqVcUzAoNfovSEYCn3ZJetiOohU0:vqEIqVcUzAoN9u3MMF

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks