General

  • Target

    84ebe156a2361c1dcd11a16b59bc988297f9bf54b45190ebe28617f8eccd551dN.exe

  • Size

    7.6MB

  • Sample

    241206-gl5nwsyqgj

  • MD5

    5c7e8b92f6cfb492a40e64142cc4a390

  • SHA1

    86977dc33727f6ff846e2dbb0e4207b2f9db486f

  • SHA256

    84ebe156a2361c1dcd11a16b59bc988297f9bf54b45190ebe28617f8eccd551d

  • SHA512

    82e40f293be53a71756b77ea1d43d664a5ec4e90fb75856103a9a25e159403ceec3340af8dc980dfed0d0017078f80e44b963d94dd5e877b1a68ba1e2a5a812d

  • SSDEEP

    196608:YrZfHWP9VAurErvI9pWjgfPvzm6gsFEB4AuK:s2lWurEUWjC3zDb84AuK

Malware Config

Targets

    • Target

      84ebe156a2361c1dcd11a16b59bc988297f9bf54b45190ebe28617f8eccd551dN.exe

    • Size

      7.6MB

    • MD5

      5c7e8b92f6cfb492a40e64142cc4a390

    • SHA1

      86977dc33727f6ff846e2dbb0e4207b2f9db486f

    • SHA256

      84ebe156a2361c1dcd11a16b59bc988297f9bf54b45190ebe28617f8eccd551d

    • SHA512

      82e40f293be53a71756b77ea1d43d664a5ec4e90fb75856103a9a25e159403ceec3340af8dc980dfed0d0017078f80e44b963d94dd5e877b1a68ba1e2a5a812d

    • SSDEEP

      196608:YrZfHWP9VAurErvI9pWjgfPvzm6gsFEB4AuK:s2lWurEUWjC3zDb84AuK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks