General

  • Target

    ThunderClient(beta).exe

  • Size

    6.9MB

  • Sample

    241019-nl22bswaqq

  • MD5

    cac0db7518cf5126dc51e4c459ed9974

  • SHA1

    1f9c02d59f01cd217acbbea3a0f9c3e0750dce02

  • SHA256

    7fc6e360742fa44307a177c51b68ee12a3dcde79420ae9fe2dcced2591f08299

  • SHA512

    e8869f0263d331f02609cfbf9a78c08ad9294ea0e11d30b9a8737c0554d8c55caf44d0d9fed42cd05f31587e41b0089adec54e7ec7870718bc6bc8af18c0a708

  • SSDEEP

    98304:lPDjWM8JEE1FLqamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFn:lP0xjeNTfm/pf+xk4dWRpmrbW3jmrP

Malware Config

Targets

    • Target

      ThunderClient(beta).exe

    • Size

      6.9MB

    • MD5

      cac0db7518cf5126dc51e4c459ed9974

    • SHA1

      1f9c02d59f01cd217acbbea3a0f9c3e0750dce02

    • SHA256

      7fc6e360742fa44307a177c51b68ee12a3dcde79420ae9fe2dcced2591f08299

    • SHA512

      e8869f0263d331f02609cfbf9a78c08ad9294ea0e11d30b9a8737c0554d8c55caf44d0d9fed42cd05f31587e41b0089adec54e7ec7870718bc6bc8af18c0a708

    • SSDEEP

      98304:lPDjWM8JEE1FLqamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFn:lP0xjeNTfm/pf+xk4dWRpmrbW3jmrP

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �ʶIg.pyc

    • Size

      1KB

    • MD5

      2f9496825ce0d2945847a6484cf264d5

    • SHA1

      02fbc9ed8a66d941cf269a2132322b45b8249cf5

    • SHA256

      201ed7d1bbe6dc975db1cf29032baaaf1c41da51be60371e0123c537c3b87603

    • SHA512

      feed6d4ea6d3410e56202393f864fef3920c23e540730535ca68b3240c2734ff810d137c8298aea6b3b83652896ff6b896320283e1492801f33a7f95deb72463

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks