General

  • Target

    9d904569ff4c27fccee3c7bce8fefb282525a1936e7fd2078585f033fc7c61d4.exe

  • Size

    8.2MB

  • Sample

    241116-mdq4esvclk

  • MD5

    6283f49f94b76d447da48dc86504f9c4

  • SHA1

    bc648a1faceea48e1fff622beef6b0283aa2fd7d

  • SHA256

    9d904569ff4c27fccee3c7bce8fefb282525a1936e7fd2078585f033fc7c61d4

  • SHA512

    b6eb8c3a536a399de8bade6cc827d950f320d0c3c02ced9b6a0985f8882c34adfe8c5391ad48f3166fc672faebfc9339351af41697f54b1b4dab075dfd839c01

  • SSDEEP

    196608:UDgCtwfI9jUC2gYBYv3vbW4SEA+iITm1U6fp:jCiIH2gYBgDWZ+TOzR

Malware Config

Targets

    • Target

      9d904569ff4c27fccee3c7bce8fefb282525a1936e7fd2078585f033fc7c61d4.exe

    • Size

      8.2MB

    • MD5

      6283f49f94b76d447da48dc86504f9c4

    • SHA1

      bc648a1faceea48e1fff622beef6b0283aa2fd7d

    • SHA256

      9d904569ff4c27fccee3c7bce8fefb282525a1936e7fd2078585f033fc7c61d4

    • SHA512

      b6eb8c3a536a399de8bade6cc827d950f320d0c3c02ced9b6a0985f8882c34adfe8c5391ad48f3166fc672faebfc9339351af41697f54b1b4dab075dfd839c01

    • SSDEEP

      196608:UDgCtwfI9jUC2gYBYv3vbW4SEA+iITm1U6fp:jCiIH2gYBgDWZ+TOzR

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks