General
-
Target
Load3r.exe
-
Size
8.3MB
-
Sample
241121-sh3wnssrew
-
MD5
6e5e3b1ce2792e7746cc99f56f179087
-
SHA1
3475973b8f835e297d4c1b446382a277f8bc365d
-
SHA256
89ddd3f607ebbf68bb3d023c97e2a491d3fcfd10848a9098e4f2204533778dc4
-
SHA512
685759a5bf9a66ec2db4fc58ab38ede8dcf02a6392725b3d1164828a4cd83f7d21357df59ef3c999576b1e89a8a8895f4710022e9b90f37e2ce7507efd92e85f
-
SSDEEP
196608:ReuYPwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jK:JIHziK1piXLGVE4UrS0VJG
Behavioral task
behavioral1
Sample
Load3r.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Load3r.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�P&t��.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
�P&t��.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Load3r.exe
-
Size
8.3MB
-
MD5
6e5e3b1ce2792e7746cc99f56f179087
-
SHA1
3475973b8f835e297d4c1b446382a277f8bc365d
-
SHA256
89ddd3f607ebbf68bb3d023c97e2a491d3fcfd10848a9098e4f2204533778dc4
-
SHA512
685759a5bf9a66ec2db4fc58ab38ede8dcf02a6392725b3d1164828a4cd83f7d21357df59ef3c999576b1e89a8a8895f4710022e9b90f37e2ce7507efd92e85f
-
SSDEEP
196608:ReuYPwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jK:JIHziK1piXLGVE4UrS0VJG
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�P&t��.pyc
-
Size
1KB
-
MD5
6751ddb62ce507acbe8ca008538525ae
-
SHA1
741e21e85f019ef854df88123c2fac7e22354968
-
SHA256
0588051544a3cf85b4b226cb1f3e20327cfd8643622e6bdfde3c6f6e8cca9236
-
SHA512
7611442075ab90e46d7fd89e969aa99aad27eeef23d4e642dac7918eee9d7b1c62f7749083fcaa633c567dc0b4bc60cdce62815299b918541ef7a9e1ed56da82
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3