General

  • Target

    Tedwarev2.exe

  • Size

    19.1MB

  • Sample

    241117-wz1z7azpbm

  • MD5

    9dd9caa8f433711695381f7ce9bbd6da

  • SHA1

    9c2e5e1bd16d2c235e43ff771370126c8b97d228

  • SHA256

    81848755783005a5709208da1d379ecd62d34f37c2a061a763ba8c0316c70fa5

  • SHA512

    8ec724b0dede92864700b67463908736b050862674373444f262104ab191eae56f31a803c4983f0de4a997cee8311d90e29b541d15b03323e957b0d5ba8b81de

  • SSDEEP

    393216:QVGodU81XxEX6vQZn3y1j5N3Iq/qVxmj0pZky/pWu4m5RlUy2ty+:cdUkSSQZoL3dyVAj5y/pW25+

Malware Config

Targets

    • Target

      Tedwarev2.exe

    • Size

      19.1MB

    • MD5

      9dd9caa8f433711695381f7ce9bbd6da

    • SHA1

      9c2e5e1bd16d2c235e43ff771370126c8b97d228

    • SHA256

      81848755783005a5709208da1d379ecd62d34f37c2a061a763ba8c0316c70fa5

    • SHA512

      8ec724b0dede92864700b67463908736b050862674373444f262104ab191eae56f31a803c4983f0de4a997cee8311d90e29b541d15b03323e957b0d5ba8b81de

    • SSDEEP

      393216:QVGodU81XxEX6vQZn3y1j5N3Iq/qVxmj0pZky/pWu4m5RlUy2ty+:cdUkSSQZoL3dyVAj5y/pW25+

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks