General
-
Target
CatPublicFr (2).exe
-
Size
12.9MB
-
Sample
241220-vkf6ss1jgr
-
MD5
741e25e8d170e8d4a1983f8945756f22
-
SHA1
c35153f7fb0888598f65d438b270fe837cdc9fe8
-
SHA256
ea63c1b79503aeca26e1666eabd3ffd6f852f3e4d1b436d1fa7b592b18d4eb44
-
SHA512
d1761e6861728b03c15236de0d15c527d9b87276d15134cc9d5d11a89a29d045a596126c7d32373c225cdceba9e7701b5286e44f12a0d0a65402a9f52bbee606
-
SSDEEP
393216:u6Px4ae4PT1Qmrmykx4APurEUWjZZ4dDLIeyzWtPTNzx:dx4aBhQb7GYdbZZ6geNNF
Behavioral task
behavioral1
Sample
CatPublicFr (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CatPublicFr (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
���>VB.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
���>VB.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
CatPublicFr (2).exe
-
Size
12.9MB
-
MD5
741e25e8d170e8d4a1983f8945756f22
-
SHA1
c35153f7fb0888598f65d438b270fe837cdc9fe8
-
SHA256
ea63c1b79503aeca26e1666eabd3ffd6f852f3e4d1b436d1fa7b592b18d4eb44
-
SHA512
d1761e6861728b03c15236de0d15c527d9b87276d15134cc9d5d11a89a29d045a596126c7d32373c225cdceba9e7701b5286e44f12a0d0a65402a9f52bbee606
-
SSDEEP
393216:u6Px4ae4PT1Qmrmykx4APurEUWjZZ4dDLIeyzWtPTNzx:dx4aBhQb7GYdbZZ6geNNF
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
���>VB.pyc
-
Size
1KB
-
MD5
f8d13e82af49b82f4296f79d02632e1d
-
SHA1
3714c43a1dd52be887cd00db24c8721e0224fd41
-
SHA256
00d5372bee7fd16e30a52a02f2ccea0343bd8d520b735a7b97b236e7335c5c20
-
SHA512
e191b8a0b99a953a7f1e4936235f501845ddd2f46621bf9910fcc45ab3c394bebf6405ac8e8eb0b87a98625ab4af9c589c462ae8539c43a1a37983bc02a7e4de
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3