General
-
Target
Mail Access Checker by xRisky v2 [Free version].rar
-
Size
173.8MB
-
Sample
241217-z4m6nsyjew
-
MD5
a6b32c78de05f46e70353c4ef78835d7
-
SHA1
df2308aaa56a7171363a45ad74d4066395fdb28e
-
SHA256
b823e4a9a2d447217bcc6c7a7f67cabd36eab432d7d7e9d6b580fadba2446667
-
SHA512
34598fa8f4b353534ad0da5c98e16ec98794100c16879cad66cb51c9f985a5c211e7e012473c86643afec6440d51e793cb03787035609d5c5fc8e82c4479fc03
-
SSDEEP
3145728:rdmoIl768Uzz+3baQahQQAlDHor/Jp3Jqm8zV/Qlrt33VxI6C8mRHll6D1Gs:clu8UPihorD3J8Ql13VxiDRHll6R
Behavioral task
behavioral1
Sample
Mail Access Checker by xRisky v2 [Free version].rar
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
Mail Access Checker by xRisky v2 [Free version].rar
-
Size
173.8MB
-
MD5
a6b32c78de05f46e70353c4ef78835d7
-
SHA1
df2308aaa56a7171363a45ad74d4066395fdb28e
-
SHA256
b823e4a9a2d447217bcc6c7a7f67cabd36eab432d7d7e9d6b580fadba2446667
-
SHA512
34598fa8f4b353534ad0da5c98e16ec98794100c16879cad66cb51c9f985a5c211e7e012473c86643afec6440d51e793cb03787035609d5c5fc8e82c4479fc03
-
SSDEEP
3145728:rdmoIl768Uzz+3baQahQQAlDHor/Jp3Jqm8zV/Qlrt33VxI6C8mRHll6D1Gs:clu8UPihorD3J8Ql13VxiDRHll6R
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Discovery
Browser Information Discovery
1Process Discovery
1Remote System Discovery
1System Information Discovery
3System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
2Internet Connection Discovery
1Wi-Fi Discovery
1