General
-
Target
chrome.exe
-
Size
8.4MB
-
Sample
241124-cgawhaykez
-
MD5
ea6d73fe2f7fba7318d12626a0ab4dbb
-
SHA1
3b37dc8a1028e2b145d48593092852d4f0d2d2b1
-
SHA256
302e4adba81cfd49955664b2fdcd207a0e5da8bbbecfc1f4eb789603001c80d2
-
SHA512
e02c5d9ce24e916e272289826a9733c009cdda741c15fa314f39e1b63feaa070931d0365ff0defcf04969175ad8f7ddba85d07071a426158a6f60b5e066a30f6
-
SSDEEP
196608:1/MfYTwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/j8:yIHziK1piXLGVE4UrS0VJY
Behavioral task
behavioral1
Sample
chrome.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
chrome.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
chrome.exe
-
Size
8.4MB
-
MD5
ea6d73fe2f7fba7318d12626a0ab4dbb
-
SHA1
3b37dc8a1028e2b145d48593092852d4f0d2d2b1
-
SHA256
302e4adba81cfd49955664b2fdcd207a0e5da8bbbecfc1f4eb789603001c80d2
-
SHA512
e02c5d9ce24e916e272289826a9733c009cdda741c15fa314f39e1b63feaa070931d0365ff0defcf04969175ad8f7ddba85d07071a426158a6f60b5e066a30f6
-
SSDEEP
196608:1/MfYTwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/j8:yIHziK1piXLGVE4UrS0VJY
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3