General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-2b6teszgpc

  • MD5

    46990ab91a45980a5899a99b94a3f1da

  • SHA1

    fcd5e4bc3bde8361e6bc8a2ec9bcf724822ec491

  • SHA256

    705cfb1aef062d642b7fa1d95526fb8beb8e337015df78b79d770a1d04e099e6

  • SHA512

    bd83177fa0b42666ff4f9c7bf7c6b6aa239beeb50b873f688d00f7557de12834bdfabd28d2f844f8b6dc98e4e1cbb81d3d8032cd3f8cc2546e81ddabe452d827

  • SSDEEP

    98304:hKDjWM8JEE1rTRZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIO:hK0V0eNTfm/pf+xk4dWRptrbWOjgrf

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      46990ab91a45980a5899a99b94a3f1da

    • SHA1

      fcd5e4bc3bde8361e6bc8a2ec9bcf724822ec491

    • SHA256

      705cfb1aef062d642b7fa1d95526fb8beb8e337015df78b79d770a1d04e099e6

    • SHA512

      bd83177fa0b42666ff4f9c7bf7c6b6aa239beeb50b873f688d00f7557de12834bdfabd28d2f844f8b6dc98e4e1cbb81d3d8032cd3f8cc2546e81ddabe452d827

    • SSDEEP

      98304:hKDjWM8JEE1rTRZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIO:hK0V0eNTfm/pf+xk4dWRptrbWOjgrf

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks