General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-sp9b2a1fqb

  • MD5

    03a7f595753f76b964b3827e26dfef08

  • SHA1

    0bd1d2ae357d09892ad07d0eaf2be7974b818972

  • SHA256

    1ffbaf6243fecb72b24f1c6a01cbbe8c61613068dc83fb7e59ebc0afffe047ba

  • SHA512

    0f1a4fe4a05fdb2681fb5eca9af7adf43282512fc78fcbc34690009320fbf0409fd568c84b67e1ab3bfbad61772748abec6d392f306ccc0b6db2d6bf4c6cd2be

  • SSDEEP

    98304:nxDjWM8JEE1rceamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFB:nx0sHeNTfm/pf+xk4dWRptrbWOjgrG

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      03a7f595753f76b964b3827e26dfef08

    • SHA1

      0bd1d2ae357d09892ad07d0eaf2be7974b818972

    • SHA256

      1ffbaf6243fecb72b24f1c6a01cbbe8c61613068dc83fb7e59ebc0afffe047ba

    • SHA512

      0f1a4fe4a05fdb2681fb5eca9af7adf43282512fc78fcbc34690009320fbf0409fd568c84b67e1ab3bfbad61772748abec6d392f306ccc0b6db2d6bf4c6cd2be

    • SSDEEP

      98304:nxDjWM8JEE1rceamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFB:nx0sHeNTfm/pf+xk4dWRptrbWOjgrG

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks