General
-
Target
RuhwidSpoofer.exe
-
Size
8.3MB
-
Sample
241218-d3csna1mcx
-
MD5
cbbbf0ded0c8975b8c3c2500dc9ba83d
-
SHA1
edb6ae5a61045e1efe54b3c3e12c18aff8ea9e5c
-
SHA256
d3b0c7b6b47bc7ea65e3269ac9c7ca2d0026675e0e5f468394e54041a3d4931b
-
SHA512
ba1c867bb2d60aa78b26497d26b2de33af248f956c449a87e93d3a68d615fb3dd7858e1a891336cabee7b1a8be8b5fd381e68c7733091b54f75c3c14be1df20f
-
SSDEEP
196608:e1uyqZVwfI9jUC2XMvH8zPjweaBpZ0cISEu2ooccXK7oS8:tYIH2XgHq+jq283Yo5
Behavioral task
behavioral1
Sample
RuhwidSpoofer.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RuhwidSpoofer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
RuhwidSpoofer.exe
-
Size
8.3MB
-
MD5
cbbbf0ded0c8975b8c3c2500dc9ba83d
-
SHA1
edb6ae5a61045e1efe54b3c3e12c18aff8ea9e5c
-
SHA256
d3b0c7b6b47bc7ea65e3269ac9c7ca2d0026675e0e5f468394e54041a3d4931b
-
SHA512
ba1c867bb2d60aa78b26497d26b2de33af248f956c449a87e93d3a68d615fb3dd7858e1a891336cabee7b1a8be8b5fd381e68c7733091b54f75c3c14be1df20f
-
SSDEEP
196608:e1uyqZVwfI9jUC2XMvH8zPjweaBpZ0cISEu2ooccXK7oS8:tYIH2XgHq+jq283Yo5
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3