Resubmissions

23-11-2024 21:50

241123-1p5b3svkdn 10

23-11-2024 18:54

241123-xkn8hsxkhp 10

21-11-2024 00:35

241121-axm5nawgkc 10

20-11-2024 22:43

241120-2nmajsvncy 10

20-11-2024 21:08

241120-zyvzbstgmj 10

20-11-2024 21:07

241120-zyktcsshkd 10

20-11-2024 18:58

241120-xmqjcssbrp 10

20-11-2024 16:54

241120-vep7hstrck 10

19-11-2024 21:20

241119-z6yeessgjc 10

19-11-2024 19:01

241119-xpdbtazfpg 10

General

  • Target

    HeilHitler.exe

  • Size

    6.0MB

  • Sample

    241120-xmqjcssbrp

  • MD5

    aeab677edfb0b7838ad440c071a04965

  • SHA1

    9855bbfe1e4d729853c1d3fd5e51a6d767cf8203

  • SHA256

    e465cccde051595262dc76359e4a06279341b4292901a49061cf9fa1386119df

  • SHA512

    567dd7cd29f4c35e0d99470628535fddb6f801ce36708003d9a6cc95a0933b613e221c07347040746e4ee174322c02b8da4c59828b79a963ff69c9378a735849

  • SSDEEP

    98304:0bEtdFBg0amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R0BMnM3JfFTW:0SFceN/FJMIDJf0gsAGK4R0un+TW

Malware Config

Targets

    • Target

      HeilHitler.exe

    • Size

      6.0MB

    • MD5

      aeab677edfb0b7838ad440c071a04965

    • SHA1

      9855bbfe1e4d729853c1d3fd5e51a6d767cf8203

    • SHA256

      e465cccde051595262dc76359e4a06279341b4292901a49061cf9fa1386119df

    • SHA512

      567dd7cd29f4c35e0d99470628535fddb6f801ce36708003d9a6cc95a0933b613e221c07347040746e4ee174322c02b8da4c59828b79a963ff69c9378a735849

    • SSDEEP

      98304:0bEtdFBg0amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R0BMnM3JfFTW:0SFceN/FJMIDJf0gsAGK4R0un+TW

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks