General

  • Target

    VersalMenu1.4.exe

  • Size

    88.5MB

  • Sample

    241030-ytdzks1raq

  • MD5

    c22c7c008fa84b8d5443aeccd5774868

  • SHA1

    b2793c86ee92425957be7428e0ba01ffcf0afd3b

  • SHA256

    11e86f56a51d27b1c3a18060472f3202bf3c8c603444e58062453998ff53d589

  • SHA512

    7d4e855635904e5794d29f4b9173719a61af9403845b1cfe10795179d34c3ae2de86ff0987682e672752be02416421c4316d024db68c82127c2ea31556e05cff

  • SSDEEP

    1572864:02Mq8JTni+OsNLcXrrBFUM8jJjiPT4dsXDfQYZmpvT9ZnIBdG:WJTnppREhFUtF8TfSvT9ZnSG

Malware Config

Targets

    • Target

      VersalMenu1.4.exe

    • Size

      88.5MB

    • MD5

      c22c7c008fa84b8d5443aeccd5774868

    • SHA1

      b2793c86ee92425957be7428e0ba01ffcf0afd3b

    • SHA256

      11e86f56a51d27b1c3a18060472f3202bf3c8c603444e58062453998ff53d589

    • SHA512

      7d4e855635904e5794d29f4b9173719a61af9403845b1cfe10795179d34c3ae2de86ff0987682e672752be02416421c4316d024db68c82127c2ea31556e05cff

    • SSDEEP

      1572864:02Mq8JTni+OsNLcXrrBFUM8jJjiPT4dsXDfQYZmpvT9ZnIBdG:WJTnppREhFUtF8TfSvT9ZnSG

    • Enumerates VirtualBox DLL files

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks