General
-
Target
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d
-
Size
6.0MB
-
Sample
241209-sy37daxlbq
-
MD5
3a875db37aebb1662c841f67230446cc
-
SHA1
7f8dfc6a2300a98fa92d38de90461d3ea0256811
-
SHA256
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d
-
SHA512
2c63bd754badd0dc8e5b3263a9f1cf0259643af7a17feba9e62846614a0519c2363ae1f88eb20b1d6f95da12dd07ea33b364501738005a09d53704aea71fd424
-
SSDEEP
98304:Xrz4EtdFBC/JamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RjOuAKpz6rlU1:Xrz/FIseN/FJMIDJf0gsAGK4RiuAKpm2
Behavioral task
behavioral1
Sample
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d
-
Size
6.0MB
-
MD5
3a875db37aebb1662c841f67230446cc
-
SHA1
7f8dfc6a2300a98fa92d38de90461d3ea0256811
-
SHA256
8a5b97d932599b54784da43d0ae1c0ba907180ec8d1397f5e18357ff955d116d
-
SHA512
2c63bd754badd0dc8e5b3263a9f1cf0259643af7a17feba9e62846614a0519c2363ae1f88eb20b1d6f95da12dd07ea33b364501738005a09d53704aea71fd424
-
SSDEEP
98304:Xrz4EtdFBC/JamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RjOuAKpz6rlU1:Xrz/FIseN/FJMIDJf0gsAGK4RiuAKpm2
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3