General

  • Target

    40e57dd1849bcdd2949904428890b2e2e9a71db8d53a096252db25f49fa187c8.exe

  • Size

    7.8MB

  • Sample

    241114-gd11qsymel

  • MD5

    7387c25a54f0ddba2a8a37276e06630b

  • SHA1

    2f0c44f7de353f7ef4660ec036bca477edd7e000

  • SHA256

    40e57dd1849bcdd2949904428890b2e2e9a71db8d53a096252db25f49fa187c8

  • SHA512

    e5205b51d6a720e2b92925ff4018f9c7e5f121668d27ef8cef4d812d5312d9934a76dfc4880c0845cba1d3b3c5a3c4c20d8a6ed9a174c7024a7f1960fe875e88

  • SSDEEP

    196608:0bgFShewfI9jUC2gYBYv3vbW5+iITm1U6f4:RFShVIH2gYBgDW4TOzw

Malware Config

Targets

    • Target

      40e57dd1849bcdd2949904428890b2e2e9a71db8d53a096252db25f49fa187c8.exe

    • Size

      7.8MB

    • MD5

      7387c25a54f0ddba2a8a37276e06630b

    • SHA1

      2f0c44f7de353f7ef4660ec036bca477edd7e000

    • SHA256

      40e57dd1849bcdd2949904428890b2e2e9a71db8d53a096252db25f49fa187c8

    • SHA512

      e5205b51d6a720e2b92925ff4018f9c7e5f121668d27ef8cef4d812d5312d9934a76dfc4880c0845cba1d3b3c5a3c4c20d8a6ed9a174c7024a7f1960fe875e88

    • SSDEEP

      196608:0bgFShewfI9jUC2gYBYv3vbW5+iITm1U6f4:RFShVIH2gYBgDW4TOzw

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks