General

  • Target

    MCF!nd3r.exe

  • Size

    7.4MB

  • Sample

    241121-zvllgsslbm

  • MD5

    2d2d697a3378e745cf1f5da6378df2b3

  • SHA1

    fa466f27da31f58b772a50ab37a6572d520854f0

  • SHA256

    eaab7c571851ea0d19f0ee130e0399d8037834e93850194dcdec64ee6c0bcf58

  • SHA512

    8d7b9bffe4ee904e98f119c1b348535c92daa2299d0e401fbfbb88373754e46fc74e96eabd25d0eab3415a29cafa8cb1804158aedb003d151594b2995ecc50fd

  • SSDEEP

    98304:XXLMcbeurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMp:X3eurErvI9pWjgyvoaYrE41JIuIzoOY

Malware Config

Targets

    • Target

      MCF!nd3r.exe

    • Size

      7.4MB

    • MD5

      2d2d697a3378e745cf1f5da6378df2b3

    • SHA1

      fa466f27da31f58b772a50ab37a6572d520854f0

    • SHA256

      eaab7c571851ea0d19f0ee130e0399d8037834e93850194dcdec64ee6c0bcf58

    • SHA512

      8d7b9bffe4ee904e98f119c1b348535c92daa2299d0e401fbfbb88373754e46fc74e96eabd25d0eab3415a29cafa8cb1804158aedb003d151594b2995ecc50fd

    • SSDEEP

      98304:XXLMcbeurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMp:X3eurErvI9pWjgyvoaYrE41JIuIzoOY

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �p���.pyc

    • Size

      1KB

    • MD5

      d1792bc6efecf4ae176c3bbfded3bdf7

    • SHA1

      049756d4b433d6756d48848e49b465a3311b6d99

    • SHA256

      cdfd747612cf27b1061d5938bccb6175bb80517d4877dff479a996eb790ae6cd

    • SHA512

      a69af8d0ea0bb03a2c25d6ded19a68bddb1d80ed7369df747228ba44f625b52558df688584bfefd5693c167cabeb4cb46fe901ee25ff9ed5399fccb5c3457549

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks