General

  • Target

    BuhariKeyGen.exe

  • Size

    6.0MB

  • Sample

    241209-zrjmqawlgm

  • MD5

    d2f7d0fd631a500f39c763112d9cc012

  • SHA1

    88a1a52c9505e67f833e7ea37d745b2f195f0ee1

  • SHA256

    9c5e3df7c7a2750b106dc50871d9e896081f473ead5c10dccdfb1e4886e8c708

  • SHA512

    5379c49ace62615ed5d8a4f5772131269f56ac3d14d2465f01df5a47c0363d2faf0f2261263023f1b1882400913d703e465f469fe7de6e0cc9959bd838aa22fc

  • SSDEEP

    98304:qMIu4+DcdvtamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HdMlq3yMXL:qPp+DmgeNoInY7/sHfbRy9qlqHTn

Malware Config

Targets

    • Target

      BuhariKeyGen.exe

    • Size

      6.0MB

    • MD5

      d2f7d0fd631a500f39c763112d9cc012

    • SHA1

      88a1a52c9505e67f833e7ea37d745b2f195f0ee1

    • SHA256

      9c5e3df7c7a2750b106dc50871d9e896081f473ead5c10dccdfb1e4886e8c708

    • SHA512

      5379c49ace62615ed5d8a4f5772131269f56ac3d14d2465f01df5a47c0363d2faf0f2261263023f1b1882400913d703e465f469fe7de6e0cc9959bd838aa22fc

    • SSDEEP

      98304:qMIu4+DcdvtamaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HdMlq3yMXL:qPp+DmgeNoInY7/sHfbRy9qlqHTn

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks