Resubmissions

17-11-2024 15:23

241117-sskg3sxlbr 10

General

  • Target

    241117-shseyasenb_pw_infected.zip

  • Size

    5.7MB

  • Sample

    241117-sskg3sxlbr

  • MD5

    38f907835b382e8599198e92e7098cd3

  • SHA1

    7f53d329ad61f1884c85378400977dd435a833ab

  • SHA256

    7f1f1eec4f8ed6b7cfd9e6ff5d4f12df88ebc2cf64bbca12dec72da570b5b55a

  • SHA512

    0fc1f70ab1dc9ce44797fa673aa590508953be4e951fe5a06bb4fd10bf8117cc4d54e3f27e7013c8ecc7f11512e2249a12245fcd91d471b4959dc23e8e953921

  • SSDEEP

    98304:8G3iu8TQeT5DXCYfnKVkYSGKu/Pe4UI45vDYgfiU2rtCkgncU4n6u9FtVL/+Ge:8Gyu8TQeT5rVfK1f7ngpFkgB2l4c7nNU

Malware Config

Targets

    • Target

      RoShade.Installer.exe

    • Size

      5.8MB

    • MD5

      a009d18ad6b1ad27d3bfe34af2523c89

    • SHA1

      efe133b7259a700a1c838af989468ab65df1ca7b

    • SHA256

      be59ff484a7fa035caee41f9c6c70572250960f09768818b7cf9256013e2a007

    • SHA512

      9b33219a9b98eaa55a347cdd3a231e36c63d83653e2cda39cea36c3e4ffa1e4b45e317f4b15ceeb3c5a8933a996ace45fe3dc0524e1ab383a59df65126de5c38

    • SSDEEP

      98304:LimDSuXXOa7RHtJQi9UWvGfqD8WOxfmjaa15uXaDvdCK/blzFS03iw7FwXR6n3eX:LimDZtRHvUWvozWOxu9kXwvdbDlA03N4

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks