General
-
Target
MCF!nd3r.exe
-
Size
7.4MB
-
Sample
241121-zvllgsslbm
-
MD5
2d2d697a3378e745cf1f5da6378df2b3
-
SHA1
fa466f27da31f58b772a50ab37a6572d520854f0
-
SHA256
eaab7c571851ea0d19f0ee130e0399d8037834e93850194dcdec64ee6c0bcf58
-
SHA512
8d7b9bffe4ee904e98f119c1b348535c92daa2299d0e401fbfbb88373754e46fc74e96eabd25d0eab3415a29cafa8cb1804158aedb003d151594b2995ecc50fd
-
SSDEEP
98304:XXLMcbeurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMp:X3eurErvI9pWjgyvoaYrE41JIuIzoOY
Behavioral task
behavioral1
Sample
MCF!nd3r.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
�p���.pyc
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
MCF!nd3r.exe
-
Size
7.4MB
-
MD5
2d2d697a3378e745cf1f5da6378df2b3
-
SHA1
fa466f27da31f58b772a50ab37a6572d520854f0
-
SHA256
eaab7c571851ea0d19f0ee130e0399d8037834e93850194dcdec64ee6c0bcf58
-
SHA512
8d7b9bffe4ee904e98f119c1b348535c92daa2299d0e401fbfbb88373754e46fc74e96eabd25d0eab3415a29cafa8cb1804158aedb003d151594b2995ecc50fd
-
SSDEEP
98304:XXLMcbeurErvz81LpWjjUlLkvzgXO9hAlaYrzzuJZYJ1JIuIyKU78bcgPowNMp:X3eurErvI9pWjgyvoaYrE41JIuIzoOY
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�p���.pyc
-
Size
1KB
-
MD5
d1792bc6efecf4ae176c3bbfded3bdf7
-
SHA1
049756d4b433d6756d48848e49b465a3311b6d99
-
SHA256
cdfd747612cf27b1061d5938bccb6175bb80517d4877dff479a996eb790ae6cd
-
SHA512
a69af8d0ea0bb03a2c25d6ded19a68bddb1d80ed7369df747228ba44f625b52558df688584bfefd5693c167cabeb4cb46fe901ee25ff9ed5399fccb5c3457549
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3