General

  • Target

    spoofer setup.rar

  • Size

    7.6MB

  • Sample

    241126-bahgbsvqev

  • MD5

    aaca7a9db09a8648c3f3193822b3e81f

  • SHA1

    d692b0a5d88af2b81122ab4eea44e38933e57036

  • SHA256

    5678f1fa44803a8cab5118254b2cc7b4b183e9816490a30614af189b0ccf772b

  • SHA512

    2dd6b9ee98c56a9a25391c34e03414e6bbff6f6f7ddf6eff8f45e75950a1737aa8a7fbee06cbb035a2d9d846c86342ff1826294f3cc77a09dac751eea9f72189

  • SSDEEP

    196608:7Olu1BnqxgyJI80LjagVeKgUdvnpvgKaEZ:K62guIVL+AHDdvpvgKn

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.6MB

    • MD5

      4b64286b5aa7f6296bf33d84221f55b7

    • SHA1

      f67b0ce81712e2c5ac20edde53138048051ebb56

    • SHA256

      e71b44183dc6897a0430b48c1b73b6cd0d46b6a18576f3eed6a9cbd35abf6421

    • SHA512

      7e8aeb1cb6ecb251db63f5b832d16c75a3010efa68c34b863be70c59c9659885b0e2208bc5e221aebdf7ccfade7a5443f409b96303d78a2e09e605028aaf0a18

    • SSDEEP

      196608:yW0iiUQeNTfm/pf+xk4duQr0lRpmrbW3jmr3:by/pWu4BiRpmrbmyr3

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      spoofer setup/HWID Driver.exe

    • Size

      225KB

    • MD5

      af2379cc4d607a45ac44d62135fb7015

    • SHA1

      39b6d40906c7f7f080e6befa93324dddadcbd9fa

    • SHA256

      26b4699a7b9eeb16e76305d843d4ab05e94d43f3201436927e13b3ebafa90739

    • SHA512

      69899c47d0b15f92980f79517384e83373242e045ca696c6e8f930ff6454219bf609e0d84c2f91d25dfd5ef3c28c9e099c4a3a918206e957be806a1c2e0d3e99

    • SSDEEP

      6144:DCyjXhd1mialK+qoNr8PxtZE6x5v+k6f:rjXhd8ZlKOrMZE6x5b6f

    Score
    6/10
    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks