Resubmissions

05-11-2024 00:03

241105-aceyjs1bmq 10

04-11-2024 23:42

241104-3pzgyaslhm 10

General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241105-aceyjs1bmq

  • MD5

    c4b752ecacf4212ee6ff81daabf3cea5

  • SHA1

    08f93ca8e860ee45496e309178c3b298d13d5275

  • SHA256

    e8b156b122c0cab636e76dbd31c75a9c9385973f2d14ec148a3c23340a81fbf2

  • SHA512

    dfc920856801e99897b65a8513e0d385973259c1ca1988a3939e3f209a4642a2623dbe704f4ac48274114bd83d883d71bfa5c37b81095cefea428c43e44e480d

  • SSDEEP

    98304:oFDjWM8JEE1FQheamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEI2:oF0AeNTfm/pf+xk4dWRpmrbW3jmrs

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      c4b752ecacf4212ee6ff81daabf3cea5

    • SHA1

      08f93ca8e860ee45496e309178c3b298d13d5275

    • SHA256

      e8b156b122c0cab636e76dbd31c75a9c9385973f2d14ec148a3c23340a81fbf2

    • SHA512

      dfc920856801e99897b65a8513e0d385973259c1ca1988a3939e3f209a4642a2623dbe704f4ac48274114bd83d883d71bfa5c37b81095cefea428c43e44e480d

    • SSDEEP

      98304:oFDjWM8JEE1FQheamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEI2:oF0AeNTfm/pf+xk4dWRpmrbW3jmrs

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks