General

  • Target

    theme-exodus.exe

  • Size

    7.4MB

  • Sample

    241218-t4gq1avna1

  • MD5

    f03efb849b920e4ae50614f4c7bb60cb

  • SHA1

    f4129982ad0b0135d0b1ae77d4afeb50ef4efd24

  • SHA256

    06e2aff15a8445cc3c955dcad2e957f1159198343c73ef3e3423e158eb1f9a91

  • SHA512

    71f5ca1d8a7152bfa9c3b8951b2ccb12ea6ba6cfbf33d3d3c406c8de4b40fe8e0eab105d446f6ce3909dc34225b43628cc57a9fafe60b89c8b59c47d1e8a9cc5

  • SSDEEP

    196608:rr9zP9V3urErvI9pWjgfPvzm6gsFEB4Aub:1lxurEUWjC3zDb84Aub

Malware Config

Targets

    • Target

      theme-exodus.exe

    • Size

      7.4MB

    • MD5

      f03efb849b920e4ae50614f4c7bb60cb

    • SHA1

      f4129982ad0b0135d0b1ae77d4afeb50ef4efd24

    • SHA256

      06e2aff15a8445cc3c955dcad2e957f1159198343c73ef3e3423e158eb1f9a91

    • SHA512

      71f5ca1d8a7152bfa9c3b8951b2ccb12ea6ba6cfbf33d3d3c406c8de4b40fe8e0eab105d446f6ce3909dc34225b43628cc57a9fafe60b89c8b59c47d1e8a9cc5

    • SSDEEP

      196608:rr9zP9V3urErvI9pWjgfPvzm6gsFEB4Aub:1lxurEUWjC3zDb84Aub

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks