General

  • Target

    B-52.exe

  • Size

    8.1MB

  • Sample

    241011-ywq2xs1eqa

  • MD5

    eb9d9a194b6956597ad6e02a4eacd48a

  • SHA1

    6317742bff5db3dda6fba976ffc96dc153a1fca2

  • SHA256

    2f22339cbd08128706f68a855ca1d1cd538f3f17784f36de47a101d3e858f92b

  • SHA512

    630c46104f1632fba1c4be8253ac152e66d33cfb91a95912ed7c4b5e2f65affd3b3ddd62ef0b6de4527a9b96264846c48b96b8b5a96a4f2314ba8696db72299d

  • SSDEEP

    196608:4sY36IOshoKMuIkhVastRL5Di3unSE51D76:lY3FOshouIkPftRL54XCR6

Malware Config

Targets

    • Target

      B-52.exe

    • Size

      8.1MB

    • MD5

      eb9d9a194b6956597ad6e02a4eacd48a

    • SHA1

      6317742bff5db3dda6fba976ffc96dc153a1fca2

    • SHA256

      2f22339cbd08128706f68a855ca1d1cd538f3f17784f36de47a101d3e858f92b

    • SHA512

      630c46104f1632fba1c4be8253ac152e66d33cfb91a95912ed7c4b5e2f65affd3b3ddd62ef0b6de4527a9b96264846c48b96b8b5a96a4f2314ba8696db72299d

    • SSDEEP

      196608:4sY36IOshoKMuIkhVastRL5Di3unSE51D76:lY3FOshouIkPftRL54XCR6

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks