General

  • Target

    Versal Menu.exe

  • Size

    17.9MB

  • Sample

    241027-sy9n6awqcl

  • MD5

    98a6eedb80ba3cea58463c194198170f

  • SHA1

    41cd61bce83f665c4384d4f34a1fe8ca7d5afa73

  • SHA256

    f02f0082a3c2689e50f5dccd8281c0765eab30be9587d776074fdcab53dd330a

  • SHA512

    5390fda347447681649f4634a062e1ea0d02d7ba33de56bc7b64aaf1ed115cd3959272630b167e7b52e56108e057bc4f111f351f885a1b411a2656423568359f

  • SSDEEP

    393216:W8UmpKcq0Fzuf+YliGU+4LESXsurEUWjC3zDbY4ft:WIpKt0FKf+4UJVcdbCc4ft

Malware Config

Targets

    • Target

      Versal Menu.exe

    • Size

      17.9MB

    • MD5

      98a6eedb80ba3cea58463c194198170f

    • SHA1

      41cd61bce83f665c4384d4f34a1fe8ca7d5afa73

    • SHA256

      f02f0082a3c2689e50f5dccd8281c0765eab30be9587d776074fdcab53dd330a

    • SHA512

      5390fda347447681649f4634a062e1ea0d02d7ba33de56bc7b64aaf1ed115cd3959272630b167e7b52e56108e057bc4f111f351f885a1b411a2656423568359f

    • SSDEEP

      393216:W8UmpKcq0Fzuf+YliGU+4LESXsurEUWjC3zDbY4ft:WIpKt0FKf+4UJVcdbCc4ft

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks