General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241015-yzgyesyfmk

  • MD5

    85bfd2f275cd91de7051abdf3c1f56c7

  • SHA1

    ea0d6882aabb75549123f43b56f7dd10661b7aa2

  • SHA256

    8ee0599736bf583abba3ca3ff642922b0df268f48b38ddcbb16b24cb92a62e96

  • SHA512

    bc60fac5b334b0c58f5e85285db43b37436e03e3043db5a01f3fbad66791f818ad090785806fe719645c88bfd4ba0124affd1f3d85d5aafc62cc7fbfa95d5b58

  • SSDEEP

    98304:V8DjWM8JEE1rKtamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFh:V80VeNTfm/pf+xk4dWRptrbWOjgrq

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      85bfd2f275cd91de7051abdf3c1f56c7

    • SHA1

      ea0d6882aabb75549123f43b56f7dd10661b7aa2

    • SHA256

      8ee0599736bf583abba3ca3ff642922b0df268f48b38ddcbb16b24cb92a62e96

    • SHA512

      bc60fac5b334b0c58f5e85285db43b37436e03e3043db5a01f3fbad66791f818ad090785806fe719645c88bfd4ba0124affd1f3d85d5aafc62cc7fbfa95d5b58

    • SSDEEP

      98304:V8DjWM8JEE1rKtamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIFh:V80VeNTfm/pf+xk4dWRptrbWOjgrq

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks