General

  • Target

    Built.exe

  • Size

    7.2MB

  • Sample

    241105-qcrkcasdrj

  • MD5

    51666612e9b0a2dcfdefd21135f581bc

  • SHA1

    7428f757b8e0a737aaff9586800310d0460ac7a4

  • SHA256

    00f67e84e916b0d40c0bbbc2fd8a1318e30c4a41d28e2396dacbb2fbf08cf7bf

  • SHA512

    955ab6f7823654901fd0404796d86f0ae64a880c1be103e08455bebf08162b03041aff65cd13a6253d9b23a577710ad2a62c9de404344c97a2a915ef28cbdcbe

  • SSDEEP

    98304:KdDjWM8JEE1Ffi/wamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE0:Kd0WReNTfm/pf+xk4dWRpmrbW3jmr1

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.2MB

    • MD5

      51666612e9b0a2dcfdefd21135f581bc

    • SHA1

      7428f757b8e0a737aaff9586800310d0460ac7a4

    • SHA256

      00f67e84e916b0d40c0bbbc2fd8a1318e30c4a41d28e2396dacbb2fbf08cf7bf

    • SHA512

      955ab6f7823654901fd0404796d86f0ae64a880c1be103e08455bebf08162b03041aff65cd13a6253d9b23a577710ad2a62c9de404344c97a2a915ef28cbdcbe

    • SSDEEP

      98304:KdDjWM8JEE1Ffi/wamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE0:Kd0WReNTfm/pf+xk4dWRpmrbW3jmr1

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks