General

  • Target

    Built.exe

  • Size

    8.1MB

  • Sample

    241011-yq2lgawajk

  • MD5

    dea92df26c91ee8b788fd3992f9654b5

  • SHA1

    f5d0b4e1d01678b03c08af87ae08519b0989a980

  • SHA256

    b93d5ffde1846f8cec2a224af03e6f155ae236279273ca7425e7493f896b8853

  • SHA512

    ba5cec1a256cd63953819521f8f3cd186986fae0d8abe2dc8adf6429bb784ed092a64e70cb64b52f1bcbc73612dbad58b44b3ab005476b89b1d4d8e6221c088c

  • SSDEEP

    196608:wXY365XtOshoKMuIkhVastRL5Di3unSE51D7w:sY3COshouIkPftRL54XCRw

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.1MB

    • MD5

      dea92df26c91ee8b788fd3992f9654b5

    • SHA1

      f5d0b4e1d01678b03c08af87ae08519b0989a980

    • SHA256

      b93d5ffde1846f8cec2a224af03e6f155ae236279273ca7425e7493f896b8853

    • SHA512

      ba5cec1a256cd63953819521f8f3cd186986fae0d8abe2dc8adf6429bb784ed092a64e70cb64b52f1bcbc73612dbad58b44b3ab005476b89b1d4d8e6221c088c

    • SSDEEP

      196608:wXY365XtOshoKMuIkhVastRL5Di3unSE51D7w:sY3COshouIkPftRL54XCRw

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks