General

  • Target

    9e2e840f4d3189561981a395f22225d208f39d2b9fc1bdcd914c2c5ffe75126e

  • Size

    7.4MB

  • Sample

    241101-vn8efsvkck

  • MD5

    8a6a0d1a5013ac05986853ce06c98148

  • SHA1

    c5ec7e14b9a92ef86469b4344d68d1d2969d55aa

  • SHA256

    9e2e840f4d3189561981a395f22225d208f39d2b9fc1bdcd914c2c5ffe75126e

  • SHA512

    642a67ea7476dac4ea2824706c077f53911cb0169153ade73bb5f77fb41e2f08e7d8ed9550debdae071decfe739fd8ba6137a60b55b9729fce64ca70141513fa

  • SSDEEP

    98304:18Si8x9XQsQurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112v:1rP9VQurErvI9pWjgfPvzm6gsFE14Aw

Malware Config

Targets

    • Target

      9e2e840f4d3189561981a395f22225d208f39d2b9fc1bdcd914c2c5ffe75126e

    • Size

      7.4MB

    • MD5

      8a6a0d1a5013ac05986853ce06c98148

    • SHA1

      c5ec7e14b9a92ef86469b4344d68d1d2969d55aa

    • SHA256

      9e2e840f4d3189561981a395f22225d208f39d2b9fc1bdcd914c2c5ffe75126e

    • SHA512

      642a67ea7476dac4ea2824706c077f53911cb0169153ade73bb5f77fb41e2f08e7d8ed9550debdae071decfe739fd8ba6137a60b55b9729fce64ca70141513fa

    • SSDEEP

      98304:18Si8x9XQsQurErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EAKhOC112v:1rP9VQurErvI9pWjgfPvzm6gsFE14Aw

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks