General

  • Target

    Volcanoids.exe

  • Size

    7.9MB

  • Sample

    241101-y5g6davdrf

  • MD5

    0bea6a6b20390b014815e7e3d9e7ef5c

  • SHA1

    e5bda52494385f73641b1b7f16139c09b141f2ef

  • SHA256

    ca131c76cc3c4693216823e5f8cd4814b70907f5a6193e8eb058f675de8a111a

  • SHA512

    7a6f46665e523a5cc9392e477ffadcb47aa5e1c3a96a619c857454b5301438fde2bb54e281407f05c28e47c63983c7e00ccea3d0b64e80ef4785e424ac435e46

  • SSDEEP

    196608:i+HYQ+3wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jJ:QcIHziK1piXLGVE4Ue0VJN

Malware Config

Targets

    • Target

      Volcanoids.exe

    • Size

      7.9MB

    • MD5

      0bea6a6b20390b014815e7e3d9e7ef5c

    • SHA1

      e5bda52494385f73641b1b7f16139c09b141f2ef

    • SHA256

      ca131c76cc3c4693216823e5f8cd4814b70907f5a6193e8eb058f675de8a111a

    • SHA512

      7a6f46665e523a5cc9392e477ffadcb47aa5e1c3a96a619c857454b5301438fde2bb54e281407f05c28e47c63983c7e00ccea3d0b64e80ef4785e424ac435e46

    • SSDEEP

      196608:i+HYQ+3wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jJ:QcIHziK1piXLGVE4Ue0VJN

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks