General

  • Target

    TEST.exe

  • Size

    6.9MB

  • Sample

    241128-kef9ha1rfv

  • MD5

    7100e5417306c8387eb2d50dea73c09d

  • SHA1

    da375b670279c2948ce6c5052f9f4f344a892abf

  • SHA256

    c7b92bbcd228bc59048c9190b2d94d293972f6b0e566d77a1a5b10f352cb9217

  • SHA512

    c5f052ca4c7eb235e0bd6e83ff8149799af9533d25f90b7553a853dce1ff9be6f0643c6d920041bd63265d1688702a115fa3aca545c26544563fd94470b252cc

  • SSDEEP

    98304:aKDjWM8JEE1FEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFWW:aK0TeNTfm/pf+xk4dWRpmrbW3jmrr

Malware Config

Targets

    • Target

      TEST.exe

    • Size

      6.9MB

    • MD5

      7100e5417306c8387eb2d50dea73c09d

    • SHA1

      da375b670279c2948ce6c5052f9f4f344a892abf

    • SHA256

      c7b92bbcd228bc59048c9190b2d94d293972f6b0e566d77a1a5b10f352cb9217

    • SHA512

      c5f052ca4c7eb235e0bd6e83ff8149799af9533d25f90b7553a853dce1ff9be6f0643c6d920041bd63265d1688702a115fa3aca545c26544563fd94470b252cc

    • SSDEEP

      98304:aKDjWM8JEE1FEamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRpYRJJcGhEIFWW:aK0TeNTfm/pf+xk4dWRpmrbW3jmrr

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks