Resubmissions

25-11-2024 22:20

241125-186n9awmer 10

25-11-2024 22:06

241125-11ewkawjcq 10

General

  • Target

    Cs2.Mod.exe

  • Size

    8.3MB

  • Sample

    241125-186n9awmer

  • MD5

    e8198192ac0c7fbb97eaf4e096afe978

  • SHA1

    90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218

  • SHA256

    ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3

  • SHA512

    ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135

  • SSDEEP

    196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo

Malware Config

Targets

    • Target

      Cs2.Mod.exe

    • Size

      8.3MB

    • MD5

      e8198192ac0c7fbb97eaf4e096afe978

    • SHA1

      90b0bfb9c1ee5e2c518b30ecde3fc15a9a5f5218

    • SHA256

      ac0ab9e82b90540f095fdbb7ac351f84fdd1f1ffda5521de3633ffe9f36030b3

    • SHA512

      ad9aa6ccf83df6a296ad5d96f2b26b4347ae1892e2a2100a5dc108888f9f5b3f3e7fb1658a6e361631454e4c1759ee3188d7ca8e24dd380e7e9da5ac6852f135

    • SSDEEP

      196608:GZuCoYVwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jk:fFIHziK1piXLGVE4UqC0VJo

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      }��Z=�.pyc

    • Size

      1KB

    • MD5

      1c8bfd503644b981d701545ebbee672f

    • SHA1

      1e94457eb5a7ea05a0d8eb96d62b6ac77e07d8ea

    • SHA256

      144c1e5adfebaf6a11ecac4eb28b647617118aef38261a6ef845a0d0040ce29e

    • SHA512

      1813460436b1b157cd74b224cdf05e5b514f6235864d47a4db7eb2d4be20eb5af076c5cc526e3b8c546f53173cc990d8edea850d891629f85a960e6ed975959f

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks