Resubmissions

10-12-2024 10:09

241210-l6rd8asqfv 10

10-12-2024 09:17

241210-k9df4askfx 10

General

  • Target

    nitro promo gen.exe

  • Size

    7.5MB

  • Sample

    241210-k9df4askfx

  • MD5

    0ac63b6b7095d264a4abf2c1e6e53428

  • SHA1

    0aa150764147c6e03eb040b60cd170bac9bae5e8

  • SHA256

    c44661cb16943639da31332d39672902226c9f80851d5e7a3fa67aa3c6e35c9d

  • SHA512

    3a3968e5b23d2a3ec5210252b6516a741a13437a85296c82bb6c0b8214c5ba158b576a03dd330178aa9134939241e80466c360c0a390ce522d818f9530469852

  • SSDEEP

    196608:P+QCwVWurErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1z:7VWurEUWjqeWx06rYYz

Malware Config

Targets

    • Target

      nitro promo gen.exe

    • Size

      7.5MB

    • MD5

      0ac63b6b7095d264a4abf2c1e6e53428

    • SHA1

      0aa150764147c6e03eb040b60cd170bac9bae5e8

    • SHA256

      c44661cb16943639da31332d39672902226c9f80851d5e7a3fa67aa3c6e35c9d

    • SHA512

      3a3968e5b23d2a3ec5210252b6516a741a13437a85296c82bb6c0b8214c5ba158b576a03dd330178aa9134939241e80466c360c0a390ce522d818f9530469852

    • SSDEEP

      196608:P+QCwVWurErvI9pWjgN3ZdahF0pbH1AY7WtQsNo/03vC1z:7VWurEUWjqeWx06rYYz

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks