General

  • Target

    FullOption_2.1.exe

  • Size

    10.2MB

  • Sample

    241112-ntbt4s1kgw

  • MD5

    74a87692f165800a9233e0c7b089d301

  • SHA1

    35e2ffa5977fefd4afbcaf370405359c671db9bc

  • SHA256

    7268b723b672867b2ea8d49e84b723ab922b75ff28c6660d51bb57c35a325770

  • SHA512

    ad8e371a098e0370aabf76a2eeb1a93d0e5af90b5fe3fd77e590ac597a500812849ac79f4f0ce0a0ba3f872c18c967bd13bebdce313570b8fc37b07f6fb0d72c

  • SSDEEP

    196608:kCHYlZvviiOpfYpwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:gKEWIHziK1piXLGVE4Ue0VJE

Malware Config

Targets

    • Target

      FullOption_2.1.exe

    • Size

      10.2MB

    • MD5

      74a87692f165800a9233e0c7b089d301

    • SHA1

      35e2ffa5977fefd4afbcaf370405359c671db9bc

    • SHA256

      7268b723b672867b2ea8d49e84b723ab922b75ff28c6660d51bb57c35a325770

    • SHA512

      ad8e371a098e0370aabf76a2eeb1a93d0e5af90b5fe3fd77e590ac597a500812849ac79f4f0ce0a0ba3f872c18c967bd13bebdce313570b8fc37b07f6fb0d72c

    • SSDEEP

      196608:kCHYlZvviiOpfYpwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:gKEWIHziK1piXLGVE4Ue0VJE

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      f��_ .pyc

    • Size

      1KB

    • MD5

      e93eda298efdfbb70e0c58c47f153ec3

    • SHA1

      664fec2fe4b32971622705b886161e8336716237

    • SHA256

      7e667a481265d1895234e6a5e92008fd68444c21321376f7ee72f08df5b27df0

    • SHA512

      2c996b93014dda50e498893dbca88575ce26903f4789b6d7160edfa16efcc4938517d5f437af8b70608a28aa2fdd30980ad02ff2c3f6e758acbd73ab24daedcc

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks