General
-
Target
Built.exe
-
Size
7.7MB
-
Sample
241102-qkycvsvhpm
-
MD5
6cda62c0f19a88a8dcf1744c536b18ef
-
SHA1
f2af59a09769372a8f1c657f43ebea87b57bc756
-
SHA256
91bbf8eddf25001cccac191a477ecf77bb7d449662549652e764726b501483bf
-
SHA512
1d834ffb230dbebff025bc39b5c7595c965b8f2ba8287f8038381ed7ea8a63d16c31e4c03087323b5a03e8348a9523312d72ba83331552b0464acae200d22153
-
SSDEEP
98304:dXDjWM8JECle+oamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRgjPPF7f:dX0NeNTfm/pf+xk4dNSESRiJBtv2k
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.7MB
-
MD5
6cda62c0f19a88a8dcf1744c536b18ef
-
SHA1
f2af59a09769372a8f1c657f43ebea87b57bc756
-
SHA256
91bbf8eddf25001cccac191a477ecf77bb7d449662549652e764726b501483bf
-
SHA512
1d834ffb230dbebff025bc39b5c7595c965b8f2ba8287f8038381ed7ea8a63d16c31e4c03087323b5a03e8348a9523312d72ba83331552b0464acae200d22153
-
SSDEEP
98304:dXDjWM8JECle+oamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfFSpXq7eRgjPPF7f:dX0NeNTfm/pf+xk4dNSESRiJBtv2k
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3