General

  • Target

    241117-shseyasenb_pw_infected.zip

  • Size

    5.7MB

  • Sample

    241117-sqlx5asjft

  • MD5

    38f907835b382e8599198e92e7098cd3

  • SHA1

    7f53d329ad61f1884c85378400977dd435a833ab

  • SHA256

    7f1f1eec4f8ed6b7cfd9e6ff5d4f12df88ebc2cf64bbca12dec72da570b5b55a

  • SHA512

    0fc1f70ab1dc9ce44797fa673aa590508953be4e951fe5a06bb4fd10bf8117cc4d54e3f27e7013c8ecc7f11512e2249a12245fcd91d471b4959dc23e8e953921

  • SSDEEP

    98304:8G3iu8TQeT5DXCYfnKVkYSGKu/Pe4UI45vDYgfiU2rtCkgncU4n6u9FtVL/+Ge:8Gyu8TQeT5rVfK1f7ngpFkgB2l4c7nNU

Malware Config

Targets

    • Target

      RoShade.Installer.exe

    • Size

      5.8MB

    • MD5

      a009d18ad6b1ad27d3bfe34af2523c89

    • SHA1

      efe133b7259a700a1c838af989468ab65df1ca7b

    • SHA256

      be59ff484a7fa035caee41f9c6c70572250960f09768818b7cf9256013e2a007

    • SHA512

      9b33219a9b98eaa55a347cdd3a231e36c63d83653e2cda39cea36c3e4ffa1e4b45e317f4b15ceeb3c5a8933a996ace45fe3dc0524e1ab383a59df65126de5c38

    • SSDEEP

      98304:LimDSuXXOa7RHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6n3eX:LimDZtRHvUWvozWOxu9kXwvdbDlA03N4

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��kˊE2.pyc

    • Size

      857B

    • MD5

      e4bf7688db7026a7dd2246ffa49a402a

    • SHA1

      3bebb74528deb274de0410d3a7fcc4159085a7bc

    • SHA256

      3f5576401aca2bc8b6aa330fdf84dcacdc0a05d5c6e484ce2d700ace2c10312d

    • SHA512

      e25509cc3ae7486c1ee17575f9d44bf7f52ea4e9a22afa599959bf73e4e1d1342155389b2dd6a282d6ab3d0b0dd9b7fa0cb47b296e691c8d3bca8505ff74ad77

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks