General

  • Target

    Velocity.exe

  • Size

    8.3MB

  • Sample

    241128-2c9ayaynam

  • MD5

    cde93f66d271110134b9527fc2ce91a8

  • SHA1

    fe576b05427450d42c3c433fea808196f9a55645

  • SHA256

    a5f1000ac65b4423eda0fff42184b531abf7d1d30904c7b7a27fbf52f1139e1c

  • SHA512

    eaaf7641b446883902cb70ce2e5a71c78de65858d3746e8cc73650a33ad548876711f5d5aad36d148b4a93d4f19dafad2ce7b9915d55b15be1fb93a8a5af9175

  • SSDEEP

    196608:XWuYucwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jt:vIHziK1piXLGVE4UrS0VJJ

Malware Config

Targets

    • Target

      Velocity.exe

    • Size

      8.3MB

    • MD5

      cde93f66d271110134b9527fc2ce91a8

    • SHA1

      fe576b05427450d42c3c433fea808196f9a55645

    • SHA256

      a5f1000ac65b4423eda0fff42184b531abf7d1d30904c7b7a27fbf52f1139e1c

    • SHA512

      eaaf7641b446883902cb70ce2e5a71c78de65858d3746e8cc73650a33ad548876711f5d5aad36d148b4a93d4f19dafad2ce7b9915d55b15be1fb93a8a5af9175

    • SSDEEP

      196608:XWuYucwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jt:vIHziK1piXLGVE4UrS0VJJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks