General

  • Target

    SZYMUSSP00FER.rar

  • Size

    6.0MB

  • Sample

    241129-yghr1asqf1

  • MD5

    ce15238f628bc8f9d7ec5c4d341d6ae2

  • SHA1

    bdfa865bab3e7ae904bcd2c123a1529dc8f9173d

  • SHA256

    73829b03f13e50261c9e381c080223b7857be5ec60fe4c7a989056673e4bcc53

  • SHA512

    b8280880d8d846d696336cd4a0fb59bde3de3dba1df3834a0efe17607f508733e7ad37cfa107c4888334b8147fcaad137af84998924b02093ba18641c786c1a4

  • SSDEEP

    98304:Zx1s+kYdlIB2zZQHFcs8qqnGhd3CwQTK7XV8PXot8KiOGg74xV37ZY3u71:qzSmdlos9FQTalorYMxo3uZ

Malware Config

Targets

    • Target

      SZYMUS SP00FER.exe

    • Size

      6.1MB

    • MD5

      1c27d781a570dada19f6b3539a121a35

    • SHA1

      2cf27a3dd360a06b30f5a71aae1d151e81811af4

    • SHA256

      b82b55f4a64182edde053f978c8c51e4b95371b1731b6c4fe5ee8afd292d69fa

    • SHA512

      560b7b9b08f2dff54d7cf99b8b23e5330d6310dd83f918c5fec22788b4f90aa8deca5f69d69578e0e0c8ad39b5d6b7618d74dff95fc6302ffc6f1e7ac7e7c2ac

    • SSDEEP

      98304:YBEtdFBgwC1rjamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RnPMRlb3J8Ma:YAFwGeN/FJMIDJf0gsAGK4RnkR/gTx

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks