Resubmissions

27-11-2024 07:39

241127-jg48ns1kej 10

27-11-2024 07:35

241127-jez6yatpfw 10

General

  • Target

    NIEVES IMG LOGGER.rar

  • Size

    8.1MB

  • Sample

    241127-jez6yatpfw

  • MD5

    ccd0753decb7deca684e26fc8250c40c

  • SHA1

    bfe2cf6498585a6a4140433d9b73a74f8d65060d

  • SHA256

    261d96817d26ca580f92e36cc3f76c95a232862e1507aaea199bf204dea2699a

  • SHA512

    19ce281921a257dbfa080c0230e54564863fffc1be0d11af023c9faec9cedea6a9f9b9e1249e04c2d086e0b801e69ed3f043fcc2eb1d7024b7b04dc4f0e08949

  • SSDEEP

    196608:UD5hnXYmNg4W64TnHVuhNeVGPSjdeX2CgLHTQIE9bnBe:UDboP494xeNeMjX21bT/snk

Malware Config

Targets

    • Target

      Nieves logger.exe

    • Size

      8.2MB

    • MD5

      fa3bd7cef60c36ea2ac3bcc6f0e61c17

    • SHA1

      64880a1b435eb4dcd5a04d9f63b56755eff4afd1

    • SHA256

      ae96e2a9ff45303355dafa810a0d107be03983c63135ddcb9a7858f8a44be049

    • SHA512

      09ae6841dbd42216f9264fb9d58fe667c98e3d0f6fad210ccfefb548565bc8af7fa395f11ff04519dcdca26bb540ea9a6aad4575bee40def8fec783f31f9e4c2

    • SSDEEP

      196608:/rcccEzRHRrIpLjv+bhqNVoB8Ck5c7GpNlpq41J2ySEZNkfWHio6+95Wk:ms+L+9qz88Ck+7q3p91JmN8M+95Wk

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Downloads MZ/PE file

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      install requeriments easy.bat

    • Size

      44B

    • MD5

      5bacfeee9b44d220bef5db710ed15af3

    • SHA1

      6c3f4f7b3dcbddb607d329c5b650a0f8db112e42

    • SHA256

      0e017e6b26ddc2ae337b0b72ff32cfc3a4d97b8f4df5fad01036794d90d58a9a

    • SHA512

      3e783db154de86429b1b1d3848d143170453ee64664f0adb55bc71d5e7f1c733960fceddd84354d8d9b23870c9fb2951b83ffa9c955b83fef4915e7700f25d55

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks