General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    241105-rbwncascrc

  • MD5

    0b3c4412a39a1b6f2a5dabe5798c4a7e

  • SHA1

    3c3caab6dcf94f52bd03ff1e5bb22d32e856944d

  • SHA256

    5218a0496b2ac9e6ad759a7884fce55c948f89c97c0f3313b14c4db7a3015dd0

  • SHA512

    bca692d7a2d60c0f8d53ce2959e0a47e008cb543b6ba298b92ea02315faa75ae9639ba6f69520b38ab8ba6c4666abbbbe2eeab270a93b06c2a386b94ce8b3729

  • SSDEEP

    98304:ENDjWM8JEE1FJTi9amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEY:EN0zJeNTfm/pf+xk4dWRpmrbW3jmrp

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      0b3c4412a39a1b6f2a5dabe5798c4a7e

    • SHA1

      3c3caab6dcf94f52bd03ff1e5bb22d32e856944d

    • SHA256

      5218a0496b2ac9e6ad759a7884fce55c948f89c97c0f3313b14c4db7a3015dd0

    • SHA512

      bca692d7a2d60c0f8d53ce2959e0a47e008cb543b6ba298b92ea02315faa75ae9639ba6f69520b38ab8ba6c4666abbbbe2eeab270a93b06c2a386b94ce8b3729

    • SSDEEP

      98304:ENDjWM8JEE1FJTi9amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEY:EN0zJeNTfm/pf+xk4dWRpmrbW3jmrp

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks