General

  • Target

    Malware - Worms Stealers.rar

  • Size

    168.3MB

  • Sample

    241116-wz6knszqdx

  • MD5

    4c63f98f13b259e874649862c0d8c62c

  • SHA1

    3ef03e2a41670ed405c5fac932cb89308f6a0c9b

  • SHA256

    70596a9d443eb12afe1d74356ddff517283229f7bdee768bcd301de7103caee2

  • SHA512

    915ca74279e74ddb80d0aab1b21423836b2c642488634a668fa6be77aead47d084350abb17937b069093a5caeefcb8d8597b74cea3b33b362e76695f9f6720f6

  • SSDEEP

    3145728:Y146FwUJywUzYYsHTuI20c01UiaPhFuZeOKtqx:Y2QDyRYYYTDl+fztptu

Malware Config

Targets

    • Target

      Malware - Worms Stealers.rar

    • Size

      168.3MB

    • MD5

      4c63f98f13b259e874649862c0d8c62c

    • SHA1

      3ef03e2a41670ed405c5fac932cb89308f6a0c9b

    • SHA256

      70596a9d443eb12afe1d74356ddff517283229f7bdee768bcd301de7103caee2

    • SHA512

      915ca74279e74ddb80d0aab1b21423836b2c642488634a668fa6be77aead47d084350abb17937b069093a5caeefcb8d8597b74cea3b33b362e76695f9f6720f6

    • SSDEEP

      3145728:Y146FwUJywUzYYsHTuI20c01UiaPhFuZeOKtqx:Y2QDyRYYYTDl+fztptu

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks