General
-
Target
EdnerPerm.exe
-
Size
8.2MB
-
Sample
241222-h5qvhsypav
-
MD5
ae3d6a7621ee2f3f1eff1fc1555698d0
-
SHA1
24324fd51ea523bc8ab3d2d7d65eb021fd8435f1
-
SHA256
b2a1520ebf686e301f76ce1cb7a55479144d200fc83322e57481c108b7f5bcb5
-
SHA512
100e2292d1e04cf705d99be27fc5e29caef26e5f5f26ed724aabf6797fd7338005e92b556b47fe5d9ae7b5ded25d317094fae894bb013f996f7c8467a6083ea9
-
SSDEEP
196608:sNgCPwfI9jUC2gYBYv3vbW4SEA+iITm1U6f/:DCEIH2gYBgDWZ+TOzX
Behavioral task
behavioral1
Sample
EdnerPerm.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
EdnerPerm.exe
-
Size
8.2MB
-
MD5
ae3d6a7621ee2f3f1eff1fc1555698d0
-
SHA1
24324fd51ea523bc8ab3d2d7d65eb021fd8435f1
-
SHA256
b2a1520ebf686e301f76ce1cb7a55479144d200fc83322e57481c108b7f5bcb5
-
SHA512
100e2292d1e04cf705d99be27fc5e29caef26e5f5f26ed724aabf6797fd7338005e92b556b47fe5d9ae7b5ded25d317094fae894bb013f996f7c8467a6083ea9
-
SSDEEP
196608:sNgCPwfI9jUC2gYBYv3vbW4SEA+iITm1U6f/:DCEIH2gYBgDWZ+TOzX
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3