General
-
Target
FutureCheats (2).exe
-
Size
7.6MB
-
Sample
241129-vhwhps1ncq
-
MD5
a8bf9f20765916baf9f080d89c1f0a93
-
SHA1
565d4e72dcc9bcf33f7434f63873e57585662fcd
-
SHA256
582029816195fc7f7c92d596afed71e63565fa5e509c62182486be8ff8fac694
-
SHA512
19bf6c396ca8706dfb5ecdd8a3e239f28bbfebde4ce3241914295fe8c4cd82080c7805c5fe53f415737d15ea738be86cb619afb9beca8ee2a7a871a6a49818c8
-
SSDEEP
196608:kcHYfwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j9:bIHziK1piXLGVE4Ue0VJ5
Behavioral task
behavioral1
Sample
FutureCheats (2).exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
FutureCheats (2).exe
-
Size
7.6MB
-
MD5
a8bf9f20765916baf9f080d89c1f0a93
-
SHA1
565d4e72dcc9bcf33f7434f63873e57585662fcd
-
SHA256
582029816195fc7f7c92d596afed71e63565fa5e509c62182486be8ff8fac694
-
SHA512
19bf6c396ca8706dfb5ecdd8a3e239f28bbfebde4ce3241914295fe8c4cd82080c7805c5fe53f415737d15ea738be86cb619afb9beca8ee2a7a871a6a49818c8
-
SSDEEP
196608:kcHYfwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/j9:bIHziK1piXLGVE4Ue0VJ5
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1