General
-
Target
Cs2.Mod.exe
-
Size
8.3MB
-
Sample
241125-11ewkawjcq
-
MD5
e8198192ac0c7fbb97eaf4e096afe978
-
SHA1
90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218
-
SHA256
ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3
-
SHA512
ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135
-
SSDEEP
196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo
Behavioral task
behavioral1
Sample
Cs2.Mod.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Cs2.Mod.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
}��Z=�.pyc
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
}��Z=�.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Cs2.Mod.exe
-
Size
8.3MB
-
MD5
e8198192ac0c7fbb97eaf4e096afe978
-
SHA1
90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218
-
SHA256
ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3
-
SHA512
ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135
-
SSDEEP
196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
}��Z=�.pyc
-
Size
1KB
-
MD5
1c8bfd503644b981d701545ebbee672f
-
SHA1
1e94457eb5a7ea05a0d8eb96d62b6ac77e07d8ea
-
SHA256
144c1e5adfebaf6a11ecac4eb28b647617118aef38261a6ef845a0d0040ce29e
-
SHA512
1813460436b1b157cd74b224cdf05e5b514f6235864d47a4db7eb2d4be20eb5af076c5cc526e3b8c546f53173cc990d8edea850d891629f85a960e6ed975959f
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3