General
-
Target
VersalMenu.exe
-
Size
17.9MB
-
Sample
241027-s2q18ayfrd
-
MD5
98a6eedb80ba3cea58463c194198170f
-
SHA1
41cd61bce83f665c4384d4f34a1fe8ca7d5afa73
-
SHA256
f02f0082a3c2689e50f5dccd8281c0765eab30be9587d776074fdcab53dd330a
-
SHA512
5390fda347447681649f4634a062e1ea0d02d7ba33de56bc7b64aaf1ed115cd3959272630b167e7b52e56108e057bc4f111f351f885a1b411a2656423568359f
-
SSDEEP
393216:W8UmpKcq0Fzuf+YliGU+4LESXsurEUWjC3zDbY4ft:WIpKt0FKf+4UJVcdbCc4ft
Behavioral task
behavioral1
Sample
VersalMenu.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
VersalMenu.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
VersalMenu.exe
-
Size
17.9MB
-
MD5
98a6eedb80ba3cea58463c194198170f
-
SHA1
41cd61bce83f665c4384d4f34a1fe8ca7d5afa73
-
SHA256
f02f0082a3c2689e50f5dccd8281c0765eab30be9587d776074fdcab53dd330a
-
SHA512
5390fda347447681649f4634a062e1ea0d02d7ba33de56bc7b64aaf1ed115cd3959272630b167e7b52e56108e057bc4f111f351f885a1b411a2656423568359f
-
SSDEEP
393216:W8UmpKcq0Fzuf+YliGU+4LESXsurEUWjC3zDbY4ft:WIpKt0FKf+4UJVcdbCc4ft
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3