Resubmissions

06-12-2024 05:50

241206-gjl4rssra1 9

06-12-2024 05:30

241206-f7e5payken 10

06-12-2024 05:14

241206-fw57qssjaz 8

06-12-2024 05:10

241206-ft7b1s1rcx 8

06-12-2024 04:51

241206-fg8djsxjek 10

06-12-2024 04:32

241206-e5x22szqet 9

06-12-2024 04:28

241206-e3mhjazpb1 10

General

  • Target

    Cracka.rar

  • Size

    18.1MB

  • Sample

    241206-e3mhjazpb1

  • MD5

    681be9b88898fa0cdb6f9a8f41b248ec

  • SHA1

    ce3153537fc5bbe19524d475922b1423fdacd109

  • SHA256

    a21839b1f4ec7d9fa765bedf282699bdd84ed354eebfc6317bd09674b01894fb

  • SHA512

    7c8f4fa515cd839b25694fb5f0593b2fbd905100626718b7a4e32958a9a85f6c48ebf7235108d65c57e379bfd5760b1ca976cf0048e079a366118166ec79574b

  • SSDEEP

    393216:V6/rhud0xQt8EJzrF3+Evma7sJ170jVMTZE3fzYXwKpuGqQM0j:V6NudcQxxOEvq8VMcYgKpVL

Malware Config

Targets

    • Target

      Cracka.rar

    • Size

      18.1MB

    • MD5

      681be9b88898fa0cdb6f9a8f41b248ec

    • SHA1

      ce3153537fc5bbe19524d475922b1423fdacd109

    • SHA256

      a21839b1f4ec7d9fa765bedf282699bdd84ed354eebfc6317bd09674b01894fb

    • SHA512

      7c8f4fa515cd839b25694fb5f0593b2fbd905100626718b7a4e32958a9a85f6c48ebf7235108d65c57e379bfd5760b1ca976cf0048e079a366118166ec79574b

    • SSDEEP

      393216:V6/rhud0xQt8EJzrF3+Evma7sJ170jVMTZE3fzYXwKpuGqQM0j:V6NudcQxxOEvq8VMcYgKpVL

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks