General
-
Target
cheatt.exe
-
Size
7.4MB
-
Sample
241130-2f7xaaxmh1
-
MD5
d098528e2d3de4f36359c9f14481830a
-
SHA1
7203a8373ac6ab096b0dd369bccd745498ff17d4
-
SHA256
a3ed7620f4b67ba4a3b9aadea0e6f136c2d1f1d6954bfd1cd2cd5a7a7c459aa1
-
SHA512
f956f584e4df05fbc3023e34664d8dcd8ecf53ec08e48a1e54a86a71f7310c2ce433396603de5ac7159abc7fdbfc824448f66b655af937fcd3b3e39975a5e287
-
SSDEEP
196608:NG0cD/z3Y2Ljv+bhqNVoBKUh8mz4Iv9P3Ht4+O:Ji/z37L+9qz8/b4IZGt
Behavioral task
behavioral1
Sample
cheatt.exe
Resource
win10ltsc2021-20241023-it
Behavioral task
behavioral2
Sample
��ӡ�Y�.pyc
Resource
win10ltsc2021-20241023-it
Malware Config
Targets
-
-
Target
cheatt.exe
-
Size
7.4MB
-
MD5
d098528e2d3de4f36359c9f14481830a
-
SHA1
7203a8373ac6ab096b0dd369bccd745498ff17d4
-
SHA256
a3ed7620f4b67ba4a3b9aadea0e6f136c2d1f1d6954bfd1cd2cd5a7a7c459aa1
-
SHA512
f956f584e4df05fbc3023e34664d8dcd8ecf53ec08e48a1e54a86a71f7310c2ce433396603de5ac7159abc7fdbfc824448f66b655af937fcd3b3e39975a5e287
-
SSDEEP
196608:NG0cD/z3Y2Ljv+bhqNVoBKUh8mz4Iv9P3Ht4+O:Ji/z37L+9qz8/b4IZGt
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
��ӡ�Y�.pyc
-
Size
1KB
-
MD5
bc44d9a38d6c3dd72cba5317c09e8212
-
SHA1
199c6fdd71c7e5c159abbebbcc747b59e9a8da77
-
SHA256
6546e83d67100521e8a2bf7bb5ef55c2e4686e99236bc064a106bd7771319d11
-
SHA512
d2bd85ea032deb6c5e5c4172551b1b482b96afc3f08c78a79eba8324ba743899a966a2c1b9ae484d23984f7dabe1cbf84b09041dfacb3c5ab7a436923f24baf1
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3