General

  • Target

    bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat

  • Size

    271KB

  • Sample

    241122-djw27atjft

  • MD5

    e7c99129a04e08ee965a08b79137b6a3

  • SHA1

    7e7060bd33efe7eeb2d3b9f2b27244dcd3fe709f

  • SHA256

    bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c

  • SHA512

    89451efa002d7cd75c17ef4beb72d6d156695e83058e112fd85b354cf6085713b320e246264f728147e23980fbd6a512ac8518a118493bd1496971a9b3302b6f

  • SSDEEP

    1536:R2Vb2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VR:D

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

https://github.com/rouki555/lnk/raw/main/ud.bat

exe.dropper

https://github.com/rouki555/dcm/raw/main/Document.zip

Targets

    • Target

      bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c.bat

    • Size

      271KB

    • MD5

      e7c99129a04e08ee965a08b79137b6a3

    • SHA1

      7e7060bd33efe7eeb2d3b9f2b27244dcd3fe709f

    • SHA256

      bf9c2db653827ae40ddb78e9ea5733fbc917cc34247b0931b19ffae49fb31a6c

    • SHA512

      89451efa002d7cd75c17ef4beb72d6d156695e83058e112fd85b354cf6085713b320e246264f728147e23980fbd6a512ac8518a118493bd1496971a9b3302b6f

    • SSDEEP

      1536:R2Vb2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VM2VR:D

    • Blocklisted process makes network request

    • Command and Scripting Interpreter: PowerShell

      Run Powershell and hide display window.

    • Uses browser remote debugging

      Can be used control the browser and steal sensitive information such as credentials and session cookies.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks