General

  • Target

    SteamToolsSetup.exe

  • Size

    5.9MB

  • Sample

    241117-vqgphsvbnc

  • MD5

    21173abe9a3834334776ca581aaf9d54

  • SHA1

    a9ca53726a2421019d0dad6350e25ac48796129d

  • SHA256

    1cc8e9d5a1194fde2e6d96873f943aad0b69ba821834ab7893f0d44519ac7ce7

  • SHA512

    7ea2980b1bd5bf0636126aaaa8adb78f201e1c95f986af932537fa44bcfc83df1bf8446fa9f1bd52aff8400381760eb5a368c59abe0ba6b28701dd11bb2ecdb2

  • SSDEEP

    98304:yQ+4S7SFi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFkzkkqkg4gaP:yD4SYDOYjJlpZstQoS9Hf12VKXHztqwZ

Malware Config

Targets

    • Target

      SteamToolsSetup.exe

    • Size

      5.9MB

    • MD5

      21173abe9a3834334776ca581aaf9d54

    • SHA1

      a9ca53726a2421019d0dad6350e25ac48796129d

    • SHA256

      1cc8e9d5a1194fde2e6d96873f943aad0b69ba821834ab7893f0d44519ac7ce7

    • SHA512

      7ea2980b1bd5bf0636126aaaa8adb78f201e1c95f986af932537fa44bcfc83df1bf8446fa9f1bd52aff8400381760eb5a368c59abe0ba6b28701dd11bb2ecdb2

    • SSDEEP

      98304:yQ+4S7SFi65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFkzkkqkg4gaP:yD4SYDOYjJlpZstQoS9Hf12VKXHztqwZ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks