General

  • Target

    06ea0b735b623a852e6157fe5d03258b5cc95308cb2d4993a6ff31d2317b6d79N

  • Size

    5.9MB

  • Sample

    241004-jvhxlawhrh

  • MD5

    52ab0c5c1fff876e14f7e92572d6e8f0

  • SHA1

    940977181a95fcc60ccaf5c3124081a4219d6f35

  • SHA256

    06ea0b735b623a852e6157fe5d03258b5cc95308cb2d4993a6ff31d2317b6d79

  • SHA512

    111eec5da151c3856c2c2d30e4ffd7f9ec9542c8c1bcd72fe0924ebd0c1f7f7ff7b9ce18befef05f9bf9c3cdb114102bdde7e2e102c7501eff72bd8e817fcb49

  • SSDEEP

    98304:rKmoDUN43WlatE9jOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6a2nM9:rKumWbOjmFwDRxtYSHdK34kdai7bN3mt

Malware Config

Targets

    • Target

      06ea0b735b623a852e6157fe5d03258b5cc95308cb2d4993a6ff31d2317b6d79N

    • Size

      5.9MB

    • MD5

      52ab0c5c1fff876e14f7e92572d6e8f0

    • SHA1

      940977181a95fcc60ccaf5c3124081a4219d6f35

    • SHA256

      06ea0b735b623a852e6157fe5d03258b5cc95308cb2d4993a6ff31d2317b6d79

    • SHA512

      111eec5da151c3856c2c2d30e4ffd7f9ec9542c8c1bcd72fe0924ebd0c1f7f7ff7b9ce18befef05f9bf9c3cdb114102bdde7e2e102c7501eff72bd8e817fcb49

    • SSDEEP

      98304:rKmoDUN43WlatE9jOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6a2nM9:rKumWbOjmFwDRxtYSHdK34kdai7bN3mt

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks