General

  • Target

    DA-EX.exe

  • Size

    5.9MB

  • Sample

    241214-gvlblsvrhr

  • MD5

    35e367c32f350da0eb07355405e9055c

  • SHA1

    7ca83be4b4cca9e5c9c284166f6a7461c9b6601c

  • SHA256

    d282f2906445857b9795c6e67b3897e0e30bf6302d876f54ad5a3cd874e20202

  • SHA512

    b4671906cd67ff232b492f9f6ab5f398d4c6ebb43ebdd181904bb2cee82b4362b33aeb52271cdc1d386be7d79b4de5db64bd82f24dedc9f144e9e04e427f709d

  • SSDEEP

    98304:l5EtdFBGrHwamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RQOuAKHCZG+G:lYFErHReN/FJMIDJf0gsAGK4RbuAKHxv

Malware Config

Targets

    • Target

      DA-EX.exe

    • Size

      5.9MB

    • MD5

      35e367c32f350da0eb07355405e9055c

    • SHA1

      7ca83be4b4cca9e5c9c284166f6a7461c9b6601c

    • SHA256

      d282f2906445857b9795c6e67b3897e0e30bf6302d876f54ad5a3cd874e20202

    • SHA512

      b4671906cd67ff232b492f9f6ab5f398d4c6ebb43ebdd181904bb2cee82b4362b33aeb52271cdc1d386be7d79b4de5db64bd82f24dedc9f144e9e04e427f709d

    • SSDEEP

      98304:l5EtdFBGrHwamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RQOuAKHCZG+G:lYFErHReN/FJMIDJf0gsAGK4RbuAKHxv

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks