General
-
Target
VoidPGLoader.exe
-
Size
8.5MB
-
Sample
241122-zevt8ayldv
-
MD5
93de6058c879dcbc4f2aea590070bba2
-
SHA1
9f95fca5efc663bccc520fb9697d99dc3a14982f
-
SHA256
0737862a103c805e8e36d1ad8a4a39eb39cb38d3932992ca9713370fc2a2bd25
-
SHA512
834192f84c6a4828cab9b0df3a113945459ebaa94cc4da226184cd66f1f9abcba0b3b47e784fda6db5201b075cba159f22244235fada4271a0674e1caf493265
-
SSDEEP
196608:jAQPwVXiPurErvI9pWjgN3ZdahF0pbH1A5/i7WtQsNo/03vC1K:cVXiPurEUWjqeWxY6rYYK
Behavioral task
behavioral1
Sample
VoidPGLoader.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
VoidPGLoader.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
VoidPGLoader.exe
-
Size
8.5MB
-
MD5
93de6058c879dcbc4f2aea590070bba2
-
SHA1
9f95fca5efc663bccc520fb9697d99dc3a14982f
-
SHA256
0737862a103c805e8e36d1ad8a4a39eb39cb38d3932992ca9713370fc2a2bd25
-
SHA512
834192f84c6a4828cab9b0df3a113945459ebaa94cc4da226184cd66f1f9abcba0b3b47e784fda6db5201b075cba159f22244235fada4271a0674e1caf493265
-
SSDEEP
196608:jAQPwVXiPurErvI9pWjgN3ZdahF0pbH1A5/i7WtQsNo/03vC1K:cVXiPurEUWjqeWxY6rYYK
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3