General

  • Target

    Vortex.exe

  • Size

    71.6MB

  • Sample

    241206-gtsdjatlfz

  • MD5

    d417df6285a2da1807f2006c67e55fa0

  • SHA1

    6176028b0d0c99cb55ac03c4d9b7b959db76c461

  • SHA256

    5d4f08350aa10af6fb86f99bdb554131a7a14f84bfe5f8f00b979b71de535322

  • SHA512

    dcd02ea6c68d3e2a1ff000cc71f5c3b7d3c5d9111220754af70a060c4518c0e19b645f3039bbb7292c4cf6e9d3b23915788d897ed36d68c42f80da50413268b8

  • SSDEEP

    1572864:ZMqrKeGqtCilWLvchcHCthLVnT1+PjcNSxWiW/PN4XdXhvHYSObHwPU42GcBBf:ZMKpCHLvchci3VnTIqbiiGvv4iMccnf

Malware Config

Targets

    • Target

      Vortex.exe

    • Size

      71.6MB

    • MD5

      d417df6285a2da1807f2006c67e55fa0

    • SHA1

      6176028b0d0c99cb55ac03c4d9b7b959db76c461

    • SHA256

      5d4f08350aa10af6fb86f99bdb554131a7a14f84bfe5f8f00b979b71de535322

    • SHA512

      dcd02ea6c68d3e2a1ff000cc71f5c3b7d3c5d9111220754af70a060c4518c0e19b645f3039bbb7292c4cf6e9d3b23915788d897ed36d68c42f80da50413268b8

    • SSDEEP

      1572864:ZMqrKeGqtCilWLvchcHCthLVnT1+PjcNSxWiW/PN4XdXhvHYSObHwPU42GcBBf:ZMKpCHLvchci3VnTIqbiiGvv4iMccnf

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks