General
-
Target
Built.exe
-
Size
6.9MB
-
Sample
241015-x3w13swglp
-
MD5
20c914350c3d9c19b8680f9ecab17c90
-
SHA1
9892325043b4e84c69476357e39b6ec65fe0ff38
-
SHA256
5605094b7e5576ed7477292371eeb1661da4cf016896f23e4174b44bedfc1ba2
-
SHA512
a500470d021e6e9d2872e4eb51e5d875d055123c070d63101f38df6cf74fc264c40318c3f0508602933ee1ef22d77c8cb00e3dac8eeaad00b65bdac74a036ac1
-
SSDEEP
98304:xJDjWM8JEE1r7namaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFM:xJ0LKeNTfm/pf+xk4dWRptrbWOjgrH
Behavioral task
behavioral1
Sample
Built.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
6.9MB
-
MD5
20c914350c3d9c19b8680f9ecab17c90
-
SHA1
9892325043b4e84c69476357e39b6ec65fe0ff38
-
SHA256
5605094b7e5576ed7477292371eeb1661da4cf016896f23e4174b44bedfc1ba2
-
SHA512
a500470d021e6e9d2872e4eb51e5d875d055123c070d63101f38df6cf74fc264c40318c3f0508602933ee1ef22d77c8cb00e3dac8eeaad00b65bdac74a036ac1
-
SSDEEP
98304:xJDjWM8JEE1r7namaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFM:xJ0LKeNTfm/pf+xk4dWRptrbWOjgrH
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3