General
-
Target
Built.exe
-
Size
7.5MB
-
Sample
241219-rz7eratrcv
-
MD5
4051c469834f6e7854613088d6778769
-
SHA1
67115f20346d3909f4e095c63c20830c5a52fa2f
-
SHA256
9beed6fbe471e9e0f6270a4e127301ce1f9fc79b1f00cd10c4b3cfa1437a4731
-
SHA512
5e02003f8b0f09de28cf66b8469408c783ffec22cab67396ed63479e2359c6f7471899d183684fde620275216949dee3c09a627f94db66246a6c88afd021e999
-
SSDEEP
196608:vLgMwfI9jUC2gYBYv3vbW2GPFQwW+HlmiE:sTIH2gYBgDWrQwtl
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.5MB
-
MD5
4051c469834f6e7854613088d6778769
-
SHA1
67115f20346d3909f4e095c63c20830c5a52fa2f
-
SHA256
9beed6fbe471e9e0f6270a4e127301ce1f9fc79b1f00cd10c4b3cfa1437a4731
-
SHA512
5e02003f8b0f09de28cf66b8469408c783ffec22cab67396ed63479e2359c6f7471899d183684fde620275216949dee3c09a627f94db66246a6c88afd021e999
-
SSDEEP
196608:vLgMwfI9jUC2gYBYv3vbW2GPFQwW+HlmiE:sTIH2gYBgDWrQwtl
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3