General

  • Target

    DashBoardPlus.rar

  • Size

    7.4MB

  • Sample

    241002-xgdbva1ejk

  • MD5

    9b4ae9344080b377cde1b27d9b0e72a0

  • SHA1

    a2b6d026bb39aa73ddc70a25d92e9a4260dd0b6c

  • SHA256

    1d8ac1e72524b489e0da557f50b1eb6a925a308c7be505d9bb4456a1846ea561

  • SHA512

    be9c0b21ef3e18d70f0a22cee38aa7f2280073bd88e3dbb5e4c31c55807a3e52a86e7d2de82f33bb60d9501abb9039def34afbd54f4be3a5cabe695238bacde6

  • SSDEEP

    98304:+uJhb4SHUkErxyRCKMAWItbxMJMG/fIxyTiwjB2+LgcfwyBkFtDL94GqTs6s10cr:fJxrqOS7IXMVDvjJfwZPvhnuZeuNbppk

Malware Config

Targets

    • Target

      DashBoardPlus.rar

    • Size

      7.4MB

    • MD5

      9b4ae9344080b377cde1b27d9b0e72a0

    • SHA1

      a2b6d026bb39aa73ddc70a25d92e9a4260dd0b6c

    • SHA256

      1d8ac1e72524b489e0da557f50b1eb6a925a308c7be505d9bb4456a1846ea561

    • SHA512

      be9c0b21ef3e18d70f0a22cee38aa7f2280073bd88e3dbb5e4c31c55807a3e52a86e7d2de82f33bb60d9501abb9039def34afbd54f4be3a5cabe695238bacde6

    • SSDEEP

      98304:+uJhb4SHUkErxyRCKMAWItbxMJMG/fIxyTiwjB2+LgcfwyBkFtDL94GqTs6s10cr:fJxrqOS7IXMVDvjJfwZPvhnuZeuNbppk

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Downloads MZ/PE file

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks