General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241029-2tgl9a1gqr

  • MD5

    9114dea12db2ad1c2bdd1d7fa3b01730

  • SHA1

    4f260fd3c7c9abbccbde97d49a07ddb957988f57

  • SHA256

    39df9d26b87aa808a3c4334b924da591978c4c7b87e3e2b9dbaa20ef17d7fb04

  • SHA512

    7c16113a80409fa1612968c88773c56d30d5527d0171464033c6cadeeee0f37e5d314cb046246eb39633075b35240226bbd5b72732d47e61cfad0c967f081f37

  • SSDEEP

    98304:/yDjWM8JEE1FEoamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFx:/y0qJeNTfm/pf+xk4dWRpmrbW3jmrZ

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      9114dea12db2ad1c2bdd1d7fa3b01730

    • SHA1

      4f260fd3c7c9abbccbde97d49a07ddb957988f57

    • SHA256

      39df9d26b87aa808a3c4334b924da591978c4c7b87e3e2b9dbaa20ef17d7fb04

    • SHA512

      7c16113a80409fa1612968c88773c56d30d5527d0171464033c6cadeeee0f37e5d314cb046246eb39633075b35240226bbd5b72732d47e61cfad0c967f081f37

    • SSDEEP

      98304:/yDjWM8JEE1FEoamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFx:/y0qJeNTfm/pf+xk4dWRpmrbW3jmrZ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks