Resubmissions

30-10-2024 13:17

241030-qjdl3avrbm 10

30-10-2024 13:02

241030-p91zlsvpfq 10

General

  • Target

    Built (1).exe

  • Size

    8.2MB

  • Sample

    241030-p91zlsvpfq

  • MD5

    ce7ac44f2ff4131bd7649bb79c41b167

  • SHA1

    b061be326c7f7d3e441a8af688a22aaeef9a8e71

  • SHA256

    a5baebc369bb91fd2a4884f9accf643fd6b643457aff759ab987e19a966007e6

  • SHA512

    baa343b92e9292a9dfbffa282901ad77b3219bb0a50945c353d993aa4f04cd2d94f741daf8fca60955d78137b62942c2a232935df0a9a1f7374a3c1211152ae2

  • SSDEEP

    196608:YRdQWyurErvI9pWjgaAnajMsbSEo29GN6nzC+dMztKmk85:MSHurEUWjJjIfAGNmytKHM

Malware Config

Targets

    • Target

      Built (1).exe

    • Size

      8.2MB

    • MD5

      ce7ac44f2ff4131bd7649bb79c41b167

    • SHA1

      b061be326c7f7d3e441a8af688a22aaeef9a8e71

    • SHA256

      a5baebc369bb91fd2a4884f9accf643fd6b643457aff759ab987e19a966007e6

    • SHA512

      baa343b92e9292a9dfbffa282901ad77b3219bb0a50945c353d993aa4f04cd2d94f741daf8fca60955d78137b62942c2a232935df0a9a1f7374a3c1211152ae2

    • SSDEEP

      196608:YRdQWyurErvI9pWjgaAnajMsbSEo29GN6nzC+dMztKmk85:MSHurEUWjJjIfAGNmytKHM

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks