General
-
Target
Testan.zip
-
Size
7.4MB
-
Sample
240930-adnbba1eqe
-
MD5
c5716646a519968341ff4b795d59e109
-
SHA1
f79541260316385d5fc4e91a7e9e3bcf2af14af5
-
SHA256
9667cca7787a34a124a56f11862e2edddf3c0552caabfdb3f315639fcc883f50
-
SHA512
8314b4e0b1df7a788643f0e30cb7111a5df399352feb7341b04e8e25a512a7968eabea6cce9564e28cdc5cda5aa5e660f0ee4e02c1d8f7f849100fd074248c72
-
SSDEEP
196608:bGDtT8gaApohtEisuS3YtBRlE2iGwnxhCeo2N:KDtT8gpojsuS3+bEbnr7pN
Behavioral task
behavioral1
Sample
testing.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
testing.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
testing.exe
-
Size
7.5MB
-
MD5
2f60848cc614f7c6f034341870d04d4c
-
SHA1
00e2e316b97642b3af475db64673501840ad8a20
-
SHA256
c1a6adeaf1738774661da107247a759047625f989f5ef62d9bc919abe38b4f40
-
SHA512
a074973f14eafec9fabb4db8f97f55015baa1470bb6c431fdbd6db0cc535d3a7717720525ea3fe8d0f9ba032383e79e10e766c4b071a8b4d247cbbc35d518be1
-
SSDEEP
196608:GcgVVEQqwfI9jUC2gYBYv3vbW2+iITx1U6nO:sVVEQ5IH2gYBgDWJTnzO
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3