General

  • Target

    Built.exe

  • Size

    8.4MB

  • Sample

    241125-s94maatqcs

  • MD5

    2d87ae5f76287a8e3bea496941786d77

  • SHA1

    9890a7dd5d76f7764505f6fb7c06a561bbb79c1a

  • SHA256

    d1ec383970d1d35bd37dfd7aae0ad32afe63724dea35b8f42c75b090544f413f

  • SHA512

    1f3aed2addebcd6732014cf1b856bab44f978e5566377731b2361d5f6fd7b5ae0ef00e9552a37907251cefc2938590fadca5d87b367d26692ed1663077b1a0c0

  • SSDEEP

    196608:Lg/bYPr7C0hzurErvI9pWjgfPvzm6gsFEY1iF:s/bar73urEUWjC3zDbf1O

Malware Config

Targets

    • Target

      Built.exe

    • Size

      8.4MB

    • MD5

      2d87ae5f76287a8e3bea496941786d77

    • SHA1

      9890a7dd5d76f7764505f6fb7c06a561bbb79c1a

    • SHA256

      d1ec383970d1d35bd37dfd7aae0ad32afe63724dea35b8f42c75b090544f413f

    • SHA512

      1f3aed2addebcd6732014cf1b856bab44f978e5566377731b2361d5f6fd7b5ae0ef00e9552a37907251cefc2938590fadca5d87b367d26692ed1663077b1a0c0

    • SSDEEP

      196608:Lg/bYPr7C0hzurErvI9pWjgfPvzm6gsFEY1iF:s/bar73urEUWjC3zDbf1O

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      "?�*jN�.pyc

    • Size

      1KB

    • MD5

      5704f239b6b043640871d177cbc920fa

    • SHA1

      478ecc4223ebaf24d46a8d2dd6197bdbdb175634

    • SHA256

      025dc2eb02891c8eac8ff0c112e2a4ba28029545d682284a090a142df30a953b

    • SHA512

      bc4e6481c07149a61b0d515a11c1aede8212891089863b9691791fb5364a8d936894f29fe7a3e3af213a94456799b78b54249df1b7ab60b67ed932769f732ba6

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks