General
-
Target
spoofer setup.rar
-
Size
7.6MB
-
Sample
241126-bahgbsvqev
-
MD5
aaca7a9db09a8648c3f3193822b3e81f
-
SHA1
d692b0a5d88af2b81122ab4eea44e38933e57036
-
SHA256
5678f1fa44803a8cab5118254b2cc7b4b183e9816490a30614af189b0ccf772b
-
SHA512
2dd6b9ee98c56a9a25391c34e03414e6bbff6f6f7ddf6eff8f45e75950a1737aa8a7fbee06cbb035a2d9d846c86342ff1826294f3cc77a09dac751eea9f72189
-
SSDEEP
196608:7Olu1BnqxgyJI80LjagVeKgUdvnpvgKaEZ:K62guIVL+AHDdvpvgKn
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
spoofer setup/HWID Driver.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.6MB
-
MD5
4b64286b5aa7f6296bf33d84221f55b7
-
SHA1
f67b0ce81712e2c5ac20edde53138048051ebb56
-
SHA256
e71b44183dc6897a0430b48c1b73b6cd0d46b6a18576f3eed6a9cbd35abf6421
-
SHA512
7e8aeb1cb6ecb251db63f5b832d16c75a3010efa68c34b863be70c59c9659885b0e2208bc5e221aebdf7ccfade7a5443f409b96303d78a2e09e605028aaf0a18
-
SSDEEP
196608:yW0iiUQeNTfm/pf+xk4duQr0lRpmrbW3jmr3:by/pWu4BiRpmrbmyr3
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
spoofer setup/HWID Driver.exe
-
Size
225KB
-
MD5
af2379cc4d607a45ac44d62135fb7015
-
SHA1
39b6d40906c7f7f080e6befa93324dddadcbd9fa
-
SHA256
26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739
-
SHA512
69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99
-
SSDEEP
6144:DCyjXhd1mialK+qoNr8PxtZE6x5v+k6f:rjXhd8ZlKOrMZE6x5b6f
Score6/10-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Pre-OS Boot
1Bootkit
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3