General

  • Target

    81631d6d2599b5b3b26a458a9f47c67ab4cdfc325e4f83a59141ead06c924c29.exe

  • Size

    6.0MB

  • Sample

    241124-njb25atldj

  • MD5

    3f82b6e40ea40e846280aa542ed4e77e

  • SHA1

    1c3780026bb7cbb3343939bd241b16b0881eb9b6

  • SHA256

    81631d6d2599b5b3b26a458a9f47c67ab4cdfc325e4f83a59141ead06c924c29

  • SHA512

    3a280209ea982e0fe197a9683037fbdf7553b1ecaa6f7d5e3963f5dca959c1107fe4030ce9ac4ab687c863c7971d06db2691a81271d53106ae5b9ad11b9cd5f7

  • SSDEEP

    98304:skEtdFBCm/I5NamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RxOnAKuP/tyv:szFIm/PeN/FJMIDJf0gsAGK4R0nAKuXK

Malware Config

Targets

    • Target

      81631d6d2599b5b3b26a458a9f47c67ab4cdfc325e4f83a59141ead06c924c29.exe

    • Size

      6.0MB

    • MD5

      3f82b6e40ea40e846280aa542ed4e77e

    • SHA1

      1c3780026bb7cbb3343939bd241b16b0881eb9b6

    • SHA256

      81631d6d2599b5b3b26a458a9f47c67ab4cdfc325e4f83a59141ead06c924c29

    • SHA512

      3a280209ea982e0fe197a9683037fbdf7553b1ecaa6f7d5e3963f5dca959c1107fe4030ce9ac4ab687c863c7971d06db2691a81271d53106ae5b9ad11b9cd5f7

    • SSDEEP

      98304:skEtdFBCm/I5NamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RxOnAKuP/tyv:szFIm/PeN/FJMIDJf0gsAGK4R0nAKuXK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks