General
-
Target
Extreme Injector v3.exe
-
Size
7.4MB
-
Sample
240930-zj1ahaycjd
-
MD5
d28e163aab4da5664c63564bd1370c18
-
SHA1
cbb8226cb955e1566725a32a9f00b0aa78a9acfc
-
SHA256
f8c7aec8429344a8b05b290b83d0cdd860cc72f9dc38a6d9ed411a84bd4ebd0c
-
SHA512
5f9140a490e563aabf3ccd96940d43f59ab3182b82e29ffc8b9184262aa3cffa6f5dd10bd2050469bf3d1f0f0079382a81b581340f6aa478183ad9f82a8c9306
-
SSDEEP
98304:QfSi8x9XQsgJn0urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOCi:QqP9Vg2urErvI9pWjgfPvzm6gsFEg4AM
Behavioral task
behavioral1
Sample
Extreme Injector v3.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
�~t� cb.pyc
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Extreme Injector v3.exe
-
Size
7.4MB
-
MD5
d28e163aab4da5664c63564bd1370c18
-
SHA1
cbb8226cb955e1566725a32a9f00b0aa78a9acfc
-
SHA256
f8c7aec8429344a8b05b290b83d0cdd860cc72f9dc38a6d9ed411a84bd4ebd0c
-
SHA512
5f9140a490e563aabf3ccd96940d43f59ab3182b82e29ffc8b9184262aa3cffa6f5dd10bd2050469bf3d1f0f0079382a81b581340f6aa478183ad9f82a8c9306
-
SSDEEP
98304:QfSi8x9XQsgJn0urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EJKhOCi:QqP9Vg2urErvI9pWjgfPvzm6gsFEg4AM
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�~t� cb.pyc
-
Size
1KB
-
MD5
2a6bee6a643255836c25ac6b99b50b67
-
SHA1
d5e461aaac31905bc291c59c64c3434494c94b29
-
SHA256
ce14e09c767166a862a33969511f3024dd9f8101b9811cb2be0139cb1902dd2e
-
SHA512
1035dc96f3fa7aa9660f2231f5f4051f8651e583d5d224a7c992b292a7ade0000e37311d17c815b8d6797c6882a04eff76299fc3598f1c94231dbf108003cbc5
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3