General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241015-pkk7vsteqh
-
MD5
d47ba96078184ac5ab02a6dda6843586
-
SHA1
addcb6a4ce5b40d042282bdc65d9d86cbbfac8e1
-
SHA256
51c3c00595f5b373feb2fffbb256d4c7314badf7acaa05521e4fa002db87a4d3
-
SHA512
6227dcec27e6aed7119228b709d1261f40d30ea7d2ce4f7b4ad457ee918b1f7688b997dfe3f14340924c52389e23aeda0a0bc5380855682965b645584b856848
-
SSDEEP
98304:aZDjWM8JEE1rWz+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIW:aZ0GzneNTfm/pf+xk4dWRptrbWOjgrb
Behavioral task
behavioral1
Sample
Built.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
d47ba96078184ac5ab02a6dda6843586
-
SHA1
addcb6a4ce5b40d042282bdc65d9d86cbbfac8e1
-
SHA256
51c3c00595f5b373feb2fffbb256d4c7314badf7acaa05521e4fa002db87a4d3
-
SHA512
6227dcec27e6aed7119228b709d1261f40d30ea7d2ce4f7b4ad457ee918b1f7688b997dfe3f14340924c52389e23aeda0a0bc5380855682965b645584b856848
-
SSDEEP
98304:aZDjWM8JEE1rWz+amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIW:aZ0GzneNTfm/pf+xk4dWRptrbWOjgrb
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3