General

  • Target

    Blaze Pub.exe

  • Size

    27.6MB

  • Sample

    241006-rj2jkasenb

  • MD5

    8558bf697302ab97d9315b7336f4c5cf

  • SHA1

    71bd8b6ffae9771c8a0853e38ff99dfea5bc4456

  • SHA256

    3ff1f0d5269bdcd53e0b88dd3aba3a3d425ea7accb92426bbdfdbe418f88dded

  • SHA512

    fb26381523c9329b0fce7f7bce3b87878283a9de75b86463e915bbf3a9bc46bf16fa6dfd7dac92c7d2a1d1c82659192c55eb27d75158deaf4bef1dbb1c718b53

  • SSDEEP

    196608:WFK4s0TfLOdo/Tw0+eNTfm/pf+xk4dWRatrbWOjgKl:WFK4Z7LpTy/pWu4kRatrbvMKl

Malware Config

Targets

    • Target

      Blaze Pub.exe

    • Size

      27.6MB

    • MD5

      8558bf697302ab97d9315b7336f4c5cf

    • SHA1

      71bd8b6ffae9771c8a0853e38ff99dfea5bc4456

    • SHA256

      3ff1f0d5269bdcd53e0b88dd3aba3a3d425ea7accb92426bbdfdbe418f88dded

    • SHA512

      fb26381523c9329b0fce7f7bce3b87878283a9de75b86463e915bbf3a9bc46bf16fa6dfd7dac92c7d2a1d1c82659192c55eb27d75158deaf4bef1dbb1c718b53

    • SSDEEP

      196608:WFK4s0TfLOdo/Tw0+eNTfm/pf+xk4dWRatrbWOjgKl:WFK4Z7LpTy/pWu4kRatrbvMKl

    • Modifies visiblity of hidden/system files in Explorer

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Drops file in System32 directory

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks