General
-
Target
main.exe
-
Size
7.5MB
-
Sample
241222-zbbl6sylgn
-
MD5
ed396e0891a07137d1149fd63beb9d84
-
SHA1
a5405cca502fbf7840a88053f5c0d2a6aea287f7
-
SHA256
89ae1787bf8c29a39d15478d2e65b7b11e721e09040d6644ef06aa6b7a20258b
-
SHA512
a54525d957c4ab0f1130e9ec834b309db7c4d7a23496296a77825b0c05a95a9a5fad1ee5339bfbe0aa1184cee665c80e08b6d3452f97575eda559f3c85002dd2
-
SSDEEP
196608:E9hhOmurErvI9pWjg/Qc+4o673pNrabeSyzWtPMYnNcsI:k1urEUWjZZ4dDLIehzWtPTNzI
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
main.exe
-
Size
7.5MB
-
MD5
ed396e0891a07137d1149fd63beb9d84
-
SHA1
a5405cca502fbf7840a88053f5c0d2a6aea287f7
-
SHA256
89ae1787bf8c29a39d15478d2e65b7b11e721e09040d6644ef06aa6b7a20258b
-
SHA512
a54525d957c4ab0f1130e9ec834b309db7c4d7a23496296a77825b0c05a95a9a5fad1ee5339bfbe0aa1184cee665c80e08b6d3452f97575eda559f3c85002dd2
-
SSDEEP
196608:E9hhOmurErvI9pWjg/Qc+4o673pNrabeSyzWtPMYnNcsI:k1urEUWjZZ4dDLIehzWtPTNzI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-