General

  • Target

    ExLauncher(CRACKED) (infected).zip

  • Size

    8.1MB

  • Sample

    241220-he1l2asrgl

  • MD5

    0ff8ac59baa7a3a61f3b9718d0d223d0

  • SHA1

    aa854f8c63f6bfcea294638a66f1697a0164513d

  • SHA256

    e3c555b84d15d0ef7423be31233f1cf17ac2c7f735df3195c757638b47d8481f

  • SHA512

    e379d69e49925b33f4d22bb598cc30df13cae417ea15b8ddab0e435da882b4776290e4eb525b7411478face1a6a83730211a96fc15f392f3c146f79619e3551c

  • SSDEEP

    196608:jYsWvjpUXTWWyoOmimpVre3GrLcCJ7ZLCjWNQfH/4zgv:jYfpUX9yEkGXcCJdLCjOQff4i

Malware Config

Targets

    • Target

      ExLauncher(CRACKED)/Bootstrapper.exe

    • Size

      8.2MB

    • MD5

      8c9d62c8a2149554ef33db69b7b1160e

    • SHA1

      5cc00654d281ef93eade5bad3031675899e2ae84

    • SHA256

      2f41ce979df543f806b01d89ebd88fbb02086978b5348ab36be10bbf4039ef6b

    • SHA512

      1391ecb2d9a4dbd2703b51e940198542c404d4c7d8ad4bb1f316155a5815f067088f15f0cfe0ea09d5f2c20414e2240e6f2a39ff10c370a4ed07c71ffd35931d

    • SSDEEP

      196608:dP+sxfNUOurErvI9pWjgU1DEzx7sKL/s1tySE1AkjUWlmHEjN:ZXxfWOurEUWjhEhn01tv+88N

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks