General

  • Target

    Cs2.Mod.exe

  • Size

    8.3MB

  • Sample

    241125-15d5tswlbn

  • MD5

    e8198192ac0c7fbb97eaf4e096afe978

  • SHA1

    90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218

  • SHA256

    ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3

  • SHA512

    ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135

  • SSDEEP

    196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo

Malware Config

Targets

    • Target

      Cs2.Mod.exe

    • Size

      8.3MB

    • MD5

      e8198192ac0c7fbb97eaf4e096afe978

    • SHA1

      90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218

    • SHA256

      ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3

    • SHA512

      ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135

    • SSDEEP

      196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks