General

  • Target

    FullOption_2.1.exe

  • Size

    10.2MB

  • Sample

    241112-nv2f6avnaq

  • MD5

    74a87692f165800a9233e0c7b089d301

  • SHA1

    35e2ffa5977fefd4afbcaf370405359c671db9bc

  • SHA256

    7268b723b672867b2ea8d49e84b723ab922b75ff28c6660d51bb57c35a325770

  • SHA512

    ad8e371a098e0370aabf76a2eeb1a93d0e5af90b5fe3fd77e590ac597a500812849ac79f4f0ce0a0ba3f872c18c967bd13bebdce313570b8fc37b07f6fb0d72c

  • SSDEEP

    196608:kCHYlZvviiOpfYpwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:gKEWIHziK1piXLGVE4Ue0VJE

Malware Config

Targets

    • Target

      FullOption_2.1.exe

    • Size

      10.2MB

    • MD5

      74a87692f165800a9233e0c7b089d301

    • SHA1

      35e2ffa5977fefd4afbcaf370405359c671db9bc

    • SHA256

      7268b723b672867b2ea8d49e84b723ab922b75ff28c6660d51bb57c35a325770

    • SHA512

      ad8e371a098e0370aabf76a2eeb1a93d0e5af90b5fe3fd77e590ac597a500812849ac79f4f0ce0a0ba3f872c18c967bd13bebdce313570b8fc37b07f6fb0d72c

    • SSDEEP

      196608:kCHYlZvviiOpfYpwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jo:gKEWIHziK1piXLGVE4Ue0VJE

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks