General

  • Target

    ARK Premium v4.rar

  • Size

    5.8MB

  • Sample

    241221-wb1phsvlfz

  • MD5

    8abd344b753f238eb81d0b5d0208f23a

  • SHA1

    149cbd47c701cc97458f867ebf09831190d705b9

  • SHA256

    4461c776b98997d20667083d19db07e892884b42410a3a4a2272a4559319d83d

  • SHA512

    8fe93569280d1929e93abe2428bed791dc78e8ab3703c53f2edd13d48c40a314f76a502f32fa3f2c0fd42cbfa89aa7d96ab3c877eb767b468e3727d860dd28d8

  • SSDEEP

    98304:2C6P7J6VKaHgQZtsUzzeQ45d7vVViohBmE2Rx3O61hiMFdWmEOQ/+Nzh+zs2EVvZ:KJ6ZgQZtsUziQ45dzfiohw9BDriM8OQ6

Malware Config

Targets

    • Target

      ARK gen v4.exe

    • Size

      5.9MB

    • MD5

      3ffe9096a09d9945254115d93d22fe69

    • SHA1

      ca12c68e82bbd5a656c817eaf46bf17da0a0689a

    • SHA256

      de83827afad4b125b56f60826cd83c4c0f699e6454d4869e74a7fba4874e04f8

    • SHA512

      c54a576ce877215f14150bc0fe69913f99bb2e807d5c21bffddc5a91bfd7e2a76f32a39a07c7df5cbd03f13145b241a60f5b55bec1a1e3a2ea97a914cfc4f617

    • SSDEEP

      98304:mkDe7pzfmt8MMhJMjarCtaCObO/OH9KkqQz4W1kgeDgFM713eMWOL:mhNzfB6yA+KO0WRti7/WOL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks