Resubmissions

08-10-2024 11:02

241008-m5dx6szdjb 10

08-10-2024 10:55

241008-m1mphstejj 10

General

  • Target

    CBLines.exe

  • Size

    6.8MB

  • Sample

    241008-m1mphstejj

  • MD5

    3007ee10af667a5b7a08383e1075ffeb

  • SHA1

    235a92053da4068ffc5071f5c7283aabc1eacd15

  • SHA256

    e461f6d4f4386add20a92e5e0a057b1b2373cf598ecb585f0b3c7a187070ad82

  • SHA512

    b0a61f79c904d1cfec1c12a3335e8af04e6849671793f8dc2840d4f2b25f698b4712c576cf7228975fab72c820f5367f1822947eefb1db932e5c20de9cf32318

  • SSDEEP

    98304:EnkwN+MdA5wqMmSd8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLD:EnV1J+B6ylnlPzf+JiJCsmFMvcn6hVvX

Malware Config

Targets

    • Target

      CBLines.exe

    • Size

      6.8MB

    • MD5

      3007ee10af667a5b7a08383e1075ffeb

    • SHA1

      235a92053da4068ffc5071f5c7283aabc1eacd15

    • SHA256

      e461f6d4f4386add20a92e5e0a057b1b2373cf598ecb585f0b3c7a187070ad82

    • SHA512

      b0a61f79c904d1cfec1c12a3335e8af04e6849671793f8dc2840d4f2b25f698b4712c576cf7228975fab72c820f5367f1822947eefb1db932e5c20de9cf32318

    • SSDEEP

      98304:EnkwN+MdA5wqMmSd8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLD:EnV1J+B6ylnlPzf+JiJCsmFMvcn6hVvX

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks