General

  • Target

    Built.exe

  • Size

    653.0MB

  • Sample

    241124-ycwhas1qgq

  • MD5

    2bc2b639e16a185a9ccb654e2994c6dd

  • SHA1

    5c35edbc54d296b9d9d3b8bbffa5b0ddb806f45b

  • SHA256

    37827c0c41e6a466ede693a2f480a3739f04ace0a75ce4571ed6b31ceb703897

  • SHA512

    fca7df9747c9609a5b169d81cfdb7097b276d8ffa69fad2dfb97b3674b8a55508f6810ba3f120dae1d1c2c15bcca06ac4e5227b14f81ff63a1a9adbaf313fb71

  • SSDEEP

    196608:f0YqDf0turErvI9pWjgaAnajMsLX/O2729Go6nzC+dWzt3U/8k:cY2f0urEUWjJjhN7AGomwt3ml

Malware Config

Targets

    • Target

      Built.exe

    • Size

      653.0MB

    • MD5

      2bc2b639e16a185a9ccb654e2994c6dd

    • SHA1

      5c35edbc54d296b9d9d3b8bbffa5b0ddb806f45b

    • SHA256

      37827c0c41e6a466ede693a2f480a3739f04ace0a75ce4571ed6b31ceb703897

    • SHA512

      fca7df9747c9609a5b169d81cfdb7097b276d8ffa69fad2dfb97b3674b8a55508f6810ba3f120dae1d1c2c15bcca06ac4e5227b14f81ff63a1a9adbaf313fb71

    • SSDEEP

      196608:f0YqDf0turErvI9pWjgaAnajMsLX/O2729Go6nzC+dWzt3U/8k:cY2f0urEUWjJjhN7AGomwt3ml

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks