General
-
Target
renameME.exe
-
Size
7.7MB
-
Sample
241025-ktbbssyclq
-
MD5
e5e1b4b6758f85bd0bdd1c3eeea59d5c
-
SHA1
0d8409395e45e0dd1d2cffa91e3a3f47227a3361
-
SHA256
dd6352b52fe3bf94623ecd43c8f5e68ec96ed98ae92fbf024a02646931f149ec
-
SHA512
23290123c32a00166dfb05f42c335b5001922ce254ebd71a8b89bfe6584ec44a4fa17145d029777d6afc480a46c0293931d423c844ebd0327f0f305e99a6b92e
-
SSDEEP
196608:DQV16bR1B6ylnlPzf+JiJCsmFMvUX/O2Nn6hqg1:5brBRlnlPSa7mmv4NNpg1
Behavioral task
behavioral1
Sample
renameME.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
renameME.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�֦R�AU.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
�֦R�AU.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
renameME.exe
-
Size
7.7MB
-
MD5
e5e1b4b6758f85bd0bdd1c3eeea59d5c
-
SHA1
0d8409395e45e0dd1d2cffa91e3a3f47227a3361
-
SHA256
dd6352b52fe3bf94623ecd43c8f5e68ec96ed98ae92fbf024a02646931f149ec
-
SHA512
23290123c32a00166dfb05f42c335b5001922ce254ebd71a8b89bfe6584ec44a4fa17145d029777d6afc480a46c0293931d423c844ebd0327f0f305e99a6b92e
-
SSDEEP
196608:DQV16bR1B6ylnlPzf+JiJCsmFMvUX/O2Nn6hqg1:5brBRlnlPSa7mmv4NNpg1
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�֦R�AU.pyc
-
Size
1KB
-
MD5
661b1c54d558d8f202abed9547d6ec3a
-
SHA1
972847d9394c62a461c4f3728387c835302d4b5c
-
SHA256
97781a7c84a9c2991a1b1229e6bc4f0ba34955d1a29cff7d00c3f85860ec6db2
-
SHA512
b903691aefbfce76306989d7fa1c959f7aee6b51c2a774fd205e92d099b6d9bd927b3c63fb83b25de774e70b414945160be97baaa6d9008a0fe3b31a796530a1
Score1/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3