Resubmissions

08-12-2024 11:07

241208-m8g41awphl 10

08-12-2024 10:56

241208-m1r91a1pb1 10

General

  • Target

    Unconfirmed 491973.crdownload

  • Size

    7.4MB

  • Sample

    241208-m8g41awphl

  • MD5

    06c8f4d6e1a87c3dac7d9f8ee0590a07

  • SHA1

    8e69e51a16c5de06d2a8229369f56ac208ae7168

  • SHA256

    dc89a29ffa3d8e5ad1ad9ca38ecf4e05f78d8b8dc6ef772e084df6c2e380ba4b

  • SHA512

    376628120d1861cc7393d3fd7c530db892488f2a481b9fea1cc6fed66ec41e7e4a660794a076c5b38823cf92937c6329e4057105a5f53b4305bc5fbdceca3300

  • SSDEEP

    196608:4i0cDJLjv+bhqNVoBKUh8mz4Iv9PQv1DVm:sixL+9qz8/b4Imv3m

Malware Config

Targets

    • Target

      Unconfirmed 491973.crdownload

    • Size

      7.4MB

    • MD5

      06c8f4d6e1a87c3dac7d9f8ee0590a07

    • SHA1

      8e69e51a16c5de06d2a8229369f56ac208ae7168

    • SHA256

      dc89a29ffa3d8e5ad1ad9ca38ecf4e05f78d8b8dc6ef772e084df6c2e380ba4b

    • SHA512

      376628120d1861cc7393d3fd7c530db892488f2a481b9fea1cc6fed66ec41e7e4a660794a076c5b38823cf92937c6329e4057105a5f53b4305bc5fbdceca3300

    • SSDEEP

      196608:4i0cDJLjv+bhqNVoBKUh8mz4Iv9PQv1DVm:sixL+9qz8/b4Imv3m

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      #gn���.pyc

    • Size

      1KB

    • MD5

      71ac40111b5aecce465b99c428ee269d

    • SHA1

      d7fc24fbeff0b63793451b6d363b8d0b1c34a344

    • SHA256

      75050a06418b0dfe164056600a4bb01ea609fe812facbaf4f06821683a4a9970

    • SHA512

      555a636a20f0a9e7bb48b66601d5dde5ce09ac6b25dc6e136d00c97858def09ce9239026f4e49f6938b89594002617df2cd9791f2e8b4470c94346f9fd2b9864

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks