General

  • Target

    FN account gen.exe

  • Size

    7.6MB

  • Sample

    241126-r2f1ksvqey

  • MD5

    db8501ec8f3502556758d22941c9e074

  • SHA1

    c676f849b781a1f54f2ce99a36c637415ba48a47

  • SHA256

    48a4bd1cfb6a02de0e5d8397a4ef2cc03815f0e4fa617e7081d7fd94f361c784

  • SHA512

    1bbf9867cd8475f4337c04c645c4b012757ff34c0c75dadc829c072a84b4d73d47aa7f096db97aa38801ae2b04c1ff9bf1f2eaa8d8049122950fcd620b69b1f6

  • SSDEEP

    196608:DXHYKwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jw:EIHziK1piXLGVE4Ue0VJU

Malware Config

Targets

    • Target

      FN account gen.exe

    • Size

      7.6MB

    • MD5

      db8501ec8f3502556758d22941c9e074

    • SHA1

      c676f849b781a1f54f2ce99a36c637415ba48a47

    • SHA256

      48a4bd1cfb6a02de0e5d8397a4ef2cc03815f0e4fa617e7081d7fd94f361c784

    • SHA512

      1bbf9867cd8475f4337c04c645c4b012757ff34c0c75dadc829c072a84b4d73d47aa7f096db97aa38801ae2b04c1ff9bf1f2eaa8d8049122950fcd620b69b1f6

    • SSDEEP

      196608:DXHYKwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jw:EIHziK1piXLGVE4Ue0VJU

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��ln;�*.pyc

    • Size

      1KB

    • MD5

      3e02a09eb994945d1acfae1ca879f33f

    • SHA1

      262de518abc7d492a5d6aad5fd4c0e4c98c442d1

    • SHA256

      adf17b7920745254357bbbd39abe406b6ac83750fa6ee11b8cbc387582ed82b6

    • SHA512

      dd1f0fa8c57bc65f86a4e5d47d7a34112a38fa1908a8b4960346dcf941791a1de21b7dd05df449dd3a07b3a5d768e3aa4d0ea5845df9ba75ea1d9bca32479b29

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks