General

  • Target

    cracked.exe

  • Size

    6.9MB

  • Sample

    241127-j2y76avpa1

  • MD5

    bc20138fe2418c809b3381e81e6b0ce0

  • SHA1

    e96b50d01639388d4bca60d31924850ceb368452

  • SHA256

    6b49c0ddf0fead611a6f8c2740954954b8523c116e9da25acc641cdbc8d0fbc8

  • SHA512

    eabf7004f7c87c55f4ace8531ef3b27a5bdb5630e69b52aae2431147156a61e5576fac1c8d7d210b2d8cc740d465893cdb3d46624ffa07675da11007ad8cee93

  • SSDEEP

    98304:1uDjWM8JEE1FIVTVamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE+:1u0iV0eNTfm/pf+xk4dWRpmrbW3jmrb

Malware Config

Targets

    • Target

      cracked.exe

    • Size

      6.9MB

    • MD5

      bc20138fe2418c809b3381e81e6b0ce0

    • SHA1

      e96b50d01639388d4bca60d31924850ceb368452

    • SHA256

      6b49c0ddf0fead611a6f8c2740954954b8523c116e9da25acc641cdbc8d0fbc8

    • SHA512

      eabf7004f7c87c55f4ace8531ef3b27a5bdb5630e69b52aae2431147156a61e5576fac1c8d7d210b2d8cc740d465893cdb3d46624ffa07675da11007ad8cee93

    • SSDEEP

      98304:1uDjWM8JEE1FIVTVamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhE+:1u0iV0eNTfm/pf+xk4dWRpmrbW3jmrb

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks