General
-
Target
AkrienBeta.rar
-
Size
8.2MB
-
Sample
241004-13r9nsyfqq
-
MD5
f0f1deb70c096c6dd31a13fb6bf3405d
-
SHA1
c55ebde5514b0f323101e07299d5d94daf3c7f9b
-
SHA256
8b70b1938bdbdcc669467362359d7adea56186bcaca29a72ae6b906e44a9d052
-
SHA512
2c67e47bb2d188bc1726c5922b6cf86a0d9bd592f0c196d4872836a8a3609b954a1c91bea45506f31e8d96031ea8a314fafd76b2b54033e0ebc99050e1cdba24
-
SSDEEP
196608:7u+oRC7axkKUkLfRvQnNRg52lpVVJegBgGZeC:ipR2aPU6IncmJegBjAC
Behavioral task
behavioral1
Sample
Akrien.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Akrien.exe
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
Akrien.exe
-
Size
8.3MB
-
MD5
c8237fbc1ebb6df62b9e7f267354988c
-
SHA1
c5c12dda9dab7b450d770745f65f131c6fdb58b5
-
SHA256
a7cfed3a6ef2d5ea805ac1ceb40eb8d4fa0328b50b884d72123d07f229a7fa3f
-
SHA512
1e63b6c87e9e80df5c5f43828d5ff1f73eadf3b261e1072cdd9228cfe190217e408f4259f437706d63540589f8ea4dbced184e5b0e3810c5277e130df96240a6
-
SSDEEP
196608:u/uqmN0ZqZMwfI9jUC2XMvH8zPjweaBpZ0cM6T2ooccXK7oS7:LOiIH2XgHq+jq8S3Yo2
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3