General
-
Target
Built.exe
-
Size
7.6MB
-
Sample
241221-dz75dsskbk
-
MD5
dd7e819e30addd058d9982a682803978
-
SHA1
d34e0b0f4bc8a8a60f0c1c33279040e4a1ba5cec
-
SHA256
1ffc168f780ed5afc618a2909f565d0ec9f7a588f8a15e98bb75d71904329d61
-
SHA512
f26ef45c1164227d28e2bc6f81db617d385c31f1627542f497d923bbbdbc3df05955f8fe12c7e552ffd5f631d2c79f75b07f4102228a2994431917599bc587d8
-
SSDEEP
196608:5XD+kdFJwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWW:952IHL7HmBYXrYSaUNc
Behavioral task
behavioral1
Sample
Built.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
+DzEU.pyc
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.6MB
-
MD5
dd7e819e30addd058d9982a682803978
-
SHA1
d34e0b0f4bc8a8a60f0c1c33279040e4a1ba5cec
-
SHA256
1ffc168f780ed5afc618a2909f565d0ec9f7a588f8a15e98bb75d71904329d61
-
SHA512
f26ef45c1164227d28e2bc6f81db617d385c31f1627542f497d923bbbdbc3df05955f8fe12c7e552ffd5f631d2c79f75b07f4102228a2994431917599bc587d8
-
SSDEEP
196608:5XD+kdFJwfI9jUCBB7m+mKOY7rXrZusoSDmhfvsbnTNeWW:952IHL7HmBYXrYSaUNc
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
+DzEU.pyc
-
Size
1KB
-
MD5
159416761674a95f2269353ea05818ab
-
SHA1
a41f5c33552900516b48e8af70126dc6cf35beae
-
SHA256
cceaa47c4c18c8ecd0f7cff9d8cc03c56f17f691d73da96e9b71cd025177dcac
-
SHA512
3653548d49a826f3c8a486784c56f4eac4608cc17b38fcd1bc6871b70c3a4335ae390f02ec8c7ecdd76d3f0dfd3c3c4cb1bbc9c837b5e06b35889efca6bb055a
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3