General

  • Target

    74c5581e2cd5d934999507f745a75aa62989197748ca173f6a9cbea10518ce82

  • Size

    26.3MB

  • Sample

    241119-t4ld7atjdm

  • MD5

    5a9690e8887cca26ce3ca6224e325e7d

  • SHA1

    2de3d36339eb4f66cf73cceb8ae1a99e98df0501

  • SHA256

    74c5581e2cd5d934999507f745a75aa62989197748ca173f6a9cbea10518ce82

  • SHA512

    fea16f32a8f8057738a8b5c81ea0b7cce4439c0340682179bcdb8990e80ee2ba0b1fa956610145915dacbfe8ac7838a070d10789818da991ab195eecfbe9107a

  • SSDEEP

    786432:xN3BufX0637apupG5aMbDqo5Dt7dEzy/pW6K4:TB6ZpG5JbO2tZLHK4

Malware Config

Targets

    • Target

      74c5581e2cd5d934999507f745a75aa62989197748ca173f6a9cbea10518ce82

    • Size

      26.3MB

    • MD5

      5a9690e8887cca26ce3ca6224e325e7d

    • SHA1

      2de3d36339eb4f66cf73cceb8ae1a99e98df0501

    • SHA256

      74c5581e2cd5d934999507f745a75aa62989197748ca173f6a9cbea10518ce82

    • SHA512

      fea16f32a8f8057738a8b5c81ea0b7cce4439c0340682179bcdb8990e80ee2ba0b1fa956610145915dacbfe8ac7838a070d10789818da991ab195eecfbe9107a

    • SSDEEP

      786432:xN3BufX0637apupG5aMbDqo5Dt7dEzy/pW6K4:TB6ZpG5JbO2tZLHK4

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks