General

  • Target

    Built.exe

  • Size

    8.2MB

  • Sample

    241012-1t3ztatckh

  • MD5

    83c4ad1e91db58733cdd1f20424a086e

  • SHA1

    88b17e14f47f605d01b07db703666259389dc313

  • SHA256

    8e24dc229f3ff2d3d94d43d216a2de3f24a0b55fd624cea0c9c45d4b12a257f3

  • SHA512

    3891e37da2937ec9c1b7905a3d3a6b797e4b9b04f8351d1095f3eef3818272f3d8775f488388ca6b8d66d75feb8550ce2cfe64cfc148a65a8491823c57626ffc

  • SSDEEP

    196608:jP/Y8BVOA0j2urErvI9pWjgfPvzm6gsWLqERnX:j1O16urEUWjC3zDwWm

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.2MB

    • MD5

      83c4ad1e91db58733cdd1f20424a086e

    • SHA1

      88b17e14f47f605d01b07db703666259389dc313

    • SHA256

      8e24dc229f3ff2d3d94d43d216a2de3f24a0b55fd624cea0c9c45d4b12a257f3

    • SHA512

      3891e37da2937ec9c1b7905a3d3a6b797e4b9b04f8351d1095f3eef3818272f3d8775f488388ca6b8d66d75feb8550ce2cfe64cfc148a65a8491823c57626ffc

    • SSDEEP

      196608:jP/Y8BVOA0j2urErvI9pWjgfPvzm6gsWLqERnX:j1O16urEUWjC3zDwWm

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks