General
-
Target
test.exe
-
Size
7.6MB
-
Sample
241013-l3sswa1bjb
-
MD5
dc6bfce338fe5fe3e16f7dd40454bc1c
-
SHA1
d7f979f9cc11978e0515aef5a72215f5690b0197
-
SHA256
231702e3b8de9eb6375ee28acea3b5fa05dff62d13f71e828d9cff71dcc6c1fb
-
SHA512
4e9650abc98ae4bfde3c6913d3858843072765ac805c4419867e494ec008d3bead38dc493a47a99dafe86d150e05c7488a97057f2e39c31ac4398a2fd9797d57
-
SSDEEP
196608:4aAOwfI9jUCfQN2rXADBbRb9K5IIs63FKIY:7AlIHIDp45IR63+
Behavioral task
behavioral1
Sample
test.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
test.exe
-
Size
7.6MB
-
MD5
dc6bfce338fe5fe3e16f7dd40454bc1c
-
SHA1
d7f979f9cc11978e0515aef5a72215f5690b0197
-
SHA256
231702e3b8de9eb6375ee28acea3b5fa05dff62d13f71e828d9cff71dcc6c1fb
-
SHA512
4e9650abc98ae4bfde3c6913d3858843072765ac805c4419867e494ec008d3bead38dc493a47a99dafe86d150e05c7488a97057f2e39c31ac4398a2fd9797d57
-
SSDEEP
196608:4aAOwfI9jUCfQN2rXADBbRb9K5IIs63FKIY:7AlIHIDp45IR63+
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1