Resubmissions

16-10-2024 19:26

241016-x5vk2axgke 10

16-10-2024 19:21

241016-x2vfvsxelb 10

General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241016-x2vfvsxelb

  • MD5

    c0016b96aeb25370a238bec4978a2b4e

  • SHA1

    9eff3107fd308b110d3d660cbdf952fe484ada59

  • SHA256

    b803d8573fd74702dc6685b2e87bdbc1766e5b67bce7880612c3d0af2663ce76

  • SHA512

    8be40138438c39e95a2093e6c4703e1b00398363b486ec42814740276c4cd81cf5ec7c07f97ad3ff22246a4003a3d09693a6a8156882771288320213be0d2d6e

  • SSDEEP

    98304:8vDjWM8JEE1rPZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF8:8v0seNTfm/pf+xk4dWRptrbWOjgrb

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      c0016b96aeb25370a238bec4978a2b4e

    • SHA1

      9eff3107fd308b110d3d660cbdf952fe484ada59

    • SHA256

      b803d8573fd74702dc6685b2e87bdbc1766e5b67bce7880612c3d0af2663ce76

    • SHA512

      8be40138438c39e95a2093e6c4703e1b00398363b486ec42814740276c4cd81cf5ec7c07f97ad3ff22246a4003a3d09693a6a8156882771288320213be0d2d6e

    • SSDEEP

      98304:8vDjWM8JEE1rPZamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYKJJcGhEIF8:8v0seNTfm/pf+xk4dWRptrbWOjgrb

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks