General

  • Target

    Nexus.zip

  • Size

    8.2MB

  • Sample

    241128-gjgjaaxpfs

  • MD5

    f3e0b7732630450ae05132fb097c3325

  • SHA1

    cb867a2ba26cba3d2c7f6d4fd891adae97ba035b

  • SHA256

    2ad65fc22e2a1cf19f5f4cb19185ac6bdfc6c3d0ddf5e8505240aefc2a554a4d

  • SHA512

    da990141f5f699ab8a0f02ce491a9b0f5acf31d7d8f45b15d51e61b9f8011b008a282fd4005743c95c1e90c04daf8a130f9b8815a0494292a7bbdf5cf2644675

  • SSDEEP

    196608:2ItwUrhunRQwQPUsrm1RX2fiJODCTHA81pheafAmlZ3z2IF2L25:2ItrcAP5QEKg6F8ax3Xn

Malware Config

Targets

    • Target

      Nexus/Nexus.exe

    • Size

      8.3MB

    • MD5

      6eb3ff96bba1ab9d3224b8b9b65c0a41

    • SHA1

      00acfd8cf818ebadb414c3828034d0a903052e14

    • SHA256

      c5002f654d2150ab1f4e7361a471b6e6e42cb878f994f7bf3ef07b98aea01171

    • SHA512

      78b1abb1e02c0689058dd29e184fcd0b9e599ae7eb980e37dde871454e55b686b4fbe9feb65f816938268700e72349eaa5df701723b4981ac93b6e78ac31f7b8

    • SSDEEP

      196608:szuYgwfI9jUCzi4H1qSiXLGVi7DMgpZASEyQ0VMwICEc/jX:QIHziK1piXLGVE4UrS0VJr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks