General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241031-3fkx7avdpm

  • MD5

    f574d54da9f3c3215ca81c9e8a921bbf

  • SHA1

    194224b340906c3617f07c28315bcfd2cc635b34

  • SHA256

    7c3be163067479545c59915487a0ffea6007cdc23d080e148ed63180cf13d527

  • SHA512

    937db1504a059a8baa74521b50c9791fec43314d12fb4b6144c67d257d0da119b3106dbbe678d4f9fe57e95f514c1050e0d821e75d1b4b15a56433f3efca574c

  • SSDEEP

    98304:eVp+DjWM8JEE1FTFxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhD:c+0bMeNTfm/pf+xk4dWRpmrbW3jmr5

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      f574d54da9f3c3215ca81c9e8a921bbf

    • SHA1

      194224b340906c3617f07c28315bcfd2cc635b34

    • SHA256

      7c3be163067479545c59915487a0ffea6007cdc23d080e148ed63180cf13d527

    • SHA512

      937db1504a059a8baa74521b50c9791fec43314d12fb4b6144c67d257d0da119b3106dbbe678d4f9fe57e95f514c1050e0d821e75d1b4b15a56433f3efca574c

    • SSDEEP

      98304:eVp+DjWM8JEE1FTFxamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhD:c+0bMeNTfm/pf+xk4dWRpmrbW3jmr5

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks