General

  • Target

    inj.exe

  • Size

    10.5MB

  • Sample

    241103-3kjkxszpcq

  • MD5

    30c4645670d838c63585b676364dd8d6

  • SHA1

    291b518f887081bea3ff7af7aba5e9874f626125

  • SHA256

    2b0cb8c8c4e9a1eb5c2c139737d7c0a391699c1891e4d46b1dbeda30368e023b

  • SHA512

    ff3adc9164022980894e077e22f561e156d1ca104d103da44551d83d3bb3e232bff01368a36213015c7cb280eb755e265e10a818723e57dd392fc88a355c5f6a

  • SSDEEP

    196608:P7QskjSBQiRMIQiV9ym+0SzXbT/9bvLz3S1bA3zIn9VDz:FPQiOI59yX0SrbTlj3S1bOzI/X

Malware Config

Targets

    • Target

      inj.exe

    • Size

      10.5MB

    • MD5

      30c4645670d838c63585b676364dd8d6

    • SHA1

      291b518f887081bea3ff7af7aba5e9874f626125

    • SHA256

      2b0cb8c8c4e9a1eb5c2c139737d7c0a391699c1891e4d46b1dbeda30368e023b

    • SHA512

      ff3adc9164022980894e077e22f561e156d1ca104d103da44551d83d3bb3e232bff01368a36213015c7cb280eb755e265e10a818723e57dd392fc88a355c5f6a

    • SSDEEP

      196608:P7QskjSBQiRMIQiV9ym+0SzXbT/9bvLz3S1bA3zIn9VDz:FPQiOI59yX0SrbTlj3S1bOzI/X

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Sets service image path in registry

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks