General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241016-p67b8athrm

  • MD5

    dbaddd9586b7003bd0f81828edd1ff25

  • SHA1

    5fbae34cd26970f80b6ca2d49346571d7e69019d

  • SHA256

    7347968122223109486bb37cb9df84fde5534e5c2c25b9ee302a28a018f87943

  • SHA512

    63c951b43631d075bd9d855ab6f93dfd97ead6fcaae861f04fb9c09e385afb4eda689ff653f4ce89333b31947d4f6f3c7a2c9a98952cf29931b9418da619923a

  • SSDEEP

    98304:P2DjWM8JEE1rTqamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF4:P20jjeNTfm/pf+xk4dWRptrbWOjgr/

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      dbaddd9586b7003bd0f81828edd1ff25

    • SHA1

      5fbae34cd26970f80b6ca2d49346571d7e69019d

    • SHA256

      7347968122223109486bb37cb9df84fde5534e5c2c25b9ee302a28a018f87943

    • SHA512

      63c951b43631d075bd9d855ab6f93dfd97ead6fcaae861f04fb9c09e385afb4eda689ff653f4ce89333b31947d4f6f3c7a2c9a98952cf29931b9418da619923a

    • SSDEEP

      98304:P2DjWM8JEE1rTqamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF4:P20jjeNTfm/pf+xk4dWRptrbWOjgr/

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks