Resubmissions

19-11-2024 10:46

241119-mt7q4svbne 10

19-11-2024 10:46

241119-mt33xsvhjl 10

19-11-2024 10:44

241119-ms88jsvgrm 10

General

  • Target

    Skyloader.exe

  • Size

    7.4MB

  • Sample

    241119-mt33xsvhjl

  • MD5

    9aafb39140717dcefd4c14204db1cf4f

  • SHA1

    e9e4e7fb27ea230ae020fed1f2f7a448ceb9e055

  • SHA256

    d962b1389af10329f10adc601df6df39c338fb9ebbe423de2ae75f68006e4637

  • SHA512

    02f4f4279179704bb21becaed65667860f4595619ecf5e23f73686d5374fc260fd09552eeac2defecb624cb28bd120c9a7769f6643ba43870f308ae48f578302

  • SSDEEP

    196608:0yYShEmTOshoKMuIkhVastRL5Di3uV1DV5:nYSyyOshouIkPftRL54u35

Malware Config

Targets

    • Target

      Skyloader.exe

    • Size

      7.4MB

    • MD5

      9aafb39140717dcefd4c14204db1cf4f

    • SHA1

      e9e4e7fb27ea230ae020fed1f2f7a448ceb9e055

    • SHA256

      d962b1389af10329f10adc601df6df39c338fb9ebbe423de2ae75f68006e4637

    • SHA512

      02f4f4279179704bb21becaed65667860f4595619ecf5e23f73686d5374fc260fd09552eeac2defecb624cb28bd120c9a7769f6643ba43870f308ae48f578302

    • SSDEEP

      196608:0yYShEmTOshoKMuIkhVastRL5Di3uV1DV5:nYSyyOshouIkPftRL54u35

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �&���E.pyc

    • Size

      1KB

    • MD5

      d8e6db8dc9ec41a4bfc9bee82952f6e7

    • SHA1

      56cbac88836e54fb14dbd1086b06a1e1832e5e9c

    • SHA256

      4a65e9c6bd5f39bcb2d7ad553626fade7f0e1883946d7e8c902f068bd6e01b5f

    • SHA512

      4193328761509c0ea59cc9e08cbf62d2f2790e2f6d4fd570ecc340551e2f65e27d1ca9b6e1ea7a9676e0ee51e4809d44aa654f8352dd84575df936f67a10e368

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks