General
-
Target
Kodak.rar
-
Size
6.7MB
-
Sample
241103-dl9q3awmcr
-
MD5
30ca2aebb61d8e8934595e95939b9fa9
-
SHA1
e3718f85901bb8360c8675c1cf2ce470d9251488
-
SHA256
886bef3e6f5c4b49c18f71bf88bbb5f1c5ab6addab24d4a8b59b13dbb0c28d7e
-
SHA512
2c62ab6f5c9f8a6e8d56efc90dc53ae514740873c94143541481d59b14d4d5113fa034ae493856cd514161f986eb7fb635404377235e12f4fea35ae89e595a5a
-
SSDEEP
98304:daRp3KKdJYy6tqUS44prOjlG7e7yQpexUPCFvx5MZjvILU5iWX5elp6eeQYh3M3N:daT5dKHS4XjA6LEBMZboU3QpkdtuHmRE
Behavioral task
behavioral1
Sample
Kodak.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Kodak.exe
-
Size
21.0MB
-
MD5
91d4be68d8832004ca15d8e6d0114b22
-
SHA1
138544d3e164698c6197be77fc228842c4dd7143
-
SHA256
30a19bb2be93115840fc77eeb6390d2a6f6ab9d5c1fd6d35a7914e7593f2c457
-
SHA512
3522355944dfdb944d7bef6373316ce729b22b025ebad4ac562d5de8012b6ad7a0bc6de85f284e69d4993363a4bcedac75def455692d1c27140825920397ccfb
-
SSDEEP
98304:PwvkwN+MdA5wqSnWn8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DovaDJ1n6hB0F:PCV1vHB6ylnlPzf+JiJCsmFMvln6hqgE
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3