General
-
Target
walterfn revived AGAIN!! unsigned.rar
-
Size
7.5MB
-
Sample
241122-sn34mayrdj
-
MD5
248163ed4affcbab61509daba1c63c1b
-
SHA1
4f3e6bbb9eb63a91204e2bea09a531818187fefd
-
SHA256
926aaf413202b89c532a7e7f4faa364fbe44d90f53dfa00b6af04de785c644e8
-
SHA512
ee067c82751febdd791bc98cb6e12ae0cf386708fc2acc081058a99afbb8a0159a2c7150401f6848a5bcd67997d273c0cd6c55c4870d4a466e063056293cd0c3
-
SSDEEP
196608:8gbI0Zjj0F98dkyJOv9GyKXCua8+OrtLXC1zCqc:PbI0Zjj0F98dnw7kCua8/FXC1Pc
Behavioral task
behavioral1
Sample
WalterFN REVIVED perm and temp.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
WalterFN REVIVED perm and temp.exe
-
Size
7.6MB
-
MD5
f56c04d05f7e84a2013697ec4122ed49
-
SHA1
73037619bc747de6fad26a605dfb8f9087c274fc
-
SHA256
a80abe51170126d2b18068704a2393a322f89c481daad6776465680e60fc4755
-
SHA512
39fc7e12e98a3608c8d788586f5644da6069ae73dd3d96c16073b1a85503fc77d659513166e74d4865689be95130eaff1a4a19695d044dda34089cc08ee27654
-
SSDEEP
196608:BtHYAi/wfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jV:/iUIHziK1piXLGVE4Ue0VJp
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3