General

  • Target

    88f5a2a29cbb249017338efbf61a9ff167c8abc7377829ec2ee2549f01f23d84

  • Size

    7.3MB

  • Sample

    241206-qn4n2svqdp

  • MD5

    c6cae2243da38121800ccdfef0b79574

  • SHA1

    b725047775c6e9e2d5702c023dcbbf4c14106ab2

  • SHA256

    88f5a2a29cbb249017338efbf61a9ff167c8abc7377829ec2ee2549f01f23d84

  • SHA512

    e573c70c62e9e719b6c62fd9bf5d27596061e3431e14952dd4d29cfd35ff0b14eb88b137fb9e545cf9db2571d2f1c1fc887334e767d022b299d251b5101e2776

  • SSDEEP

    196608:BrB3YS6UOOshoKMuIkhVastRL5Di3uh1D7J8:vYSZOOshouIkPftRL54YRJ8

Malware Config

Targets

    • Target

      88f5a2a29cbb249017338efbf61a9ff167c8abc7377829ec2ee2549f01f23d84

    • Size

      7.3MB

    • MD5

      c6cae2243da38121800ccdfef0b79574

    • SHA1

      b725047775c6e9e2d5702c023dcbbf4c14106ab2

    • SHA256

      88f5a2a29cbb249017338efbf61a9ff167c8abc7377829ec2ee2549f01f23d84

    • SHA512

      e573c70c62e9e719b6c62fd9bf5d27596061e3431e14952dd4d29cfd35ff0b14eb88b137fb9e545cf9db2571d2f1c1fc887334e767d022b299d251b5101e2776

    • SSDEEP

      196608:BrB3YS6UOOshoKMuIkhVastRL5Di3uh1D7J8:vYSZOOshouIkPftRL54YRJ8

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks