General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241103-ayws7azdpc

  • MD5

    ded8eca3047f292a1bed9f024224f640

  • SHA1

    a32242826a7f393b5cbaea646898d27618a1594e

  • SHA256

    d6f26e372d8f9a86a6fa6feaa543116ec9e743546a81643b7669a560f86efeab

  • SHA512

    6f838734f626a739321b9e0b666e6ebdefcaf424b2f3b77e1799403eef24ad3d0932ed072d4bf7758302d204ee3e6608b740e6643f9bbc94d3e5fa7cd14b5450

  • SSDEEP

    98304:dVp+DjWM8JEE1FiamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIA:d+0FeNTfm/pf+xk4dWRpmrbW3jmru

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      ded8eca3047f292a1bed9f024224f640

    • SHA1

      a32242826a7f393b5cbaea646898d27618a1594e

    • SHA256

      d6f26e372d8f9a86a6fa6feaa543116ec9e743546a81643b7669a560f86efeab

    • SHA512

      6f838734f626a739321b9e0b666e6ebdefcaf424b2f3b77e1799403eef24ad3d0932ed072d4bf7758302d204ee3e6608b740e6643f9bbc94d3e5fa7cd14b5450

    • SSDEEP

      98304:dVp+DjWM8JEE1FiamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIA:d+0FeNTfm/pf+xk4dWRpmrbW3jmru

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks