General

  • Target

    uwu.exe

  • Size

    8.7MB

  • Sample

    241019-y19d3aydjm

  • MD5

    d95a659d9b625e10072d206cb32b9014

  • SHA1

    d7ec21d30ca7d3ad623431132d4249ab5039599a

  • SHA256

    d5663b07b8bb969d6400191c86c4f10133c082d29141d8e9b1895757c1dd1fb2

  • SHA512

    683b8a7affaffb9900f8bf9d55fe1549aea4ad2662b687a6a1b0992a65775aab53753a9a2a61c8f19ab2d883c4e38f2fd6b67910936b9f46348fbf43a0314d39

  • SSDEEP

    196608:mz8PZY8Mq4dusK8B6Ljv+bhqNVoB0SEsucQZ41JBbIEs1L3:g8PZY8t4ksK0OL+9qz80SJHQK1J9sh3

Malware Config

Targets

    • Target

      uwu.exe

    • Size

      8.7MB

    • MD5

      d95a659d9b625e10072d206cb32b9014

    • SHA1

      d7ec21d30ca7d3ad623431132d4249ab5039599a

    • SHA256

      d5663b07b8bb969d6400191c86c4f10133c082d29141d8e9b1895757c1dd1fb2

    • SHA512

      683b8a7affaffb9900f8bf9d55fe1549aea4ad2662b687a6a1b0992a65775aab53753a9a2a61c8f19ab2d883c4e38f2fd6b67910936b9f46348fbf43a0314d39

    • SSDEEP

      196608:mz8PZY8Mq4dusK8B6Ljv+bhqNVoB0SEsucQZ41JBbIEs1L3:g8PZY8t4ksK0OL+9qz80SJHQK1J9sh3

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks