Resubmissions

24-12-2024 18:54

241224-xkap5atqet 10

24-12-2024 18:53

241224-xjmnastqds 10

General

  • Target

    source_prepared.exe

  • Size

    33.6MB

  • Sample

    241224-xjmnastqds

  • MD5

    f01b6ad985705419dc0e99bd34d99fa4

  • SHA1

    0ada0f834fdc2f2fbce5601f2c040a1386b57d7c

  • SHA256

    55a9fa59f3a8f884ae625df3b8bf58103eb0bfdb531bc4d4ff13eb36fafe0ea3

  • SHA512

    dc857c85e6065ce70a748ea1fbfd6612f6bf346e7275a59010cad9e0bfa410a6e36e866239f602bf987f6806b7fcb327ba0ca79e17253e1d1f87385b63d94569

  • SSDEEP

    786432:M9YidhMus4WPg1JwtW8adewq3ObRqsOBXMb8bxOn1JFECrRQ766UwWur5IydQ+C9:M9JMTBQytWte3CRrOBcX1cCwlrVC462

Malware Config

Targets

    • Target

      source_prepared.exe

    • Size

      33.6MB

    • MD5

      f01b6ad985705419dc0e99bd34d99fa4

    • SHA1

      0ada0f834fdc2f2fbce5601f2c040a1386b57d7c

    • SHA256

      55a9fa59f3a8f884ae625df3b8bf58103eb0bfdb531bc4d4ff13eb36fafe0ea3

    • SHA512

      dc857c85e6065ce70a748ea1fbfd6612f6bf346e7275a59010cad9e0bfa410a6e36e866239f602bf987f6806b7fcb327ba0ca79e17253e1d1f87385b63d94569

    • SSDEEP

      786432:M9YidhMus4WPg1JwtW8adewq3ObRqsOBXMb8bxOn1JFECrRQ766UwWur5IydQ+C9:M9JMTBQytWte3CRrOBcX1cCwlrVC462

    Score
    7/10
    • Loads dropped DLL

    • Target

      discord_token_grabber.pyc

    • Size

      16KB

    • MD5

      924ef065a5167d44170ac81a60cc6fbe

    • SHA1

      ebfa171438758dd9810369d3077f618bfab5bc09

    • SHA256

      78a36fae762432c89f4c0b185e5c227144817199dbde90d16749c6bfc0fb1dd1

    • SHA512

      15a2144fe6e0e081856fd875bcbb239a83da115dce2cda1924f71cfc401f13f681d5047cb80b40cdcdcb617c12d9c12f7bfdc15d38177ace8685c59bb631afdc

    • SSDEEP

      192:bIqqTmuEWauge+M6DA8AYv++JDcNQshU8En5W4NXOYd/G7XW:+9avP588A+DDWRm5FOUG7XW

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      9KB

    • MD5

      c9a6c4ec57f83d1aa200fe076665c42c

    • SHA1

      42bf07fb97a2ccd29a67067ae9ead40548e046b9

    • SHA256

      ec0628cca3f23628d1ff24a88e8215238eee1601cfe9e49a4525fdca15034497

    • SHA512

      ffe8ba3ff8edb65ff53b9006fa327991f9c272ace5f7cfb387080d8cd23f994842eee49246f1c32d41d6e081dff1a04f9c6b3e5d5e5e2f3cd96fead21fa09745

    • SSDEEP

      192:srJe41QfUE0xZVbFAI6dokUpjYnuHN3gQ:iQBifedokqYnuHN3gQ

    Score
    3/10
    • Target

      misc.pyc

    • Size

      4KB

    • MD5

      36ed907d6c57862deacc25f4da2bde11

    • SHA1

      0e21743b8eff2688e13055bfe26467cd3af43559

    • SHA256

      8ebd34d6a4a41a2107ab7000da651fed3996ae0e13291fe6970971b5bc0e5087

    • SHA512

      89dca2a052a77c829423d0cc1389e83b645ae97d063ccef2f47188c3b83dfeef6632d116cac714df01c908b148767d59e46006bded668f046fc78a564c52fdd4

    • SSDEEP

      96:vDh/7Y8hYPUywfLDwfPsULKliOCpmrSTUpjdaJuo1kUZsX3g:vVR5ywfwXsULPJmDpjwN1kIo3g

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      7KB

    • MD5

      cc180daa11732953527c69ac7bbea3b1

    • SHA1

      24ea916374f1fe5981219c1c330ba8f851571e9e

    • SHA256

      6a67c8b0591fef85f8436d152361796d4bf1fb3ddf46a5af873743cc16ece1fe

    • SHA512

      5e4e259999b3155ca5d9f55de691ced7c918acdab8b7c3ef7bca69903d6057a6c102a997b4b2af4a655026b3dd3ea8aed855306633392ab6a9171e70a34dbfbb

    • SSDEEP

      192:0tkwY6bLQ3hT8+NE102sGMleDkUhMbvEh:dwY6bLQ3RzHOMER

    Score
    6/10
    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      source_prepared.pyc

    • Size

      156KB

    • MD5

      e7da6e286f372c400a622943f6cd6d13

    • SHA1

      d9f9a44bc629fe4897d1702356fbf5016f6d54f5

    • SHA256

      fb49e8128484e8a0f7a5d374fa18f7baa5d9b683333e7cdc2c6173e31b79551d

    • SHA512

      88722f5422e50f2084a2455e89196a27a39d11cb24646d616726e33eddf9d76a2c979a6679ff7f0835a38230965cb4e645f113ed913b0c4139e41362761eeb8f

    • SSDEEP

      3072:GRXtGdTS2SNNsnoz7iD6GxZhQpYDItSSsiqQU:uEdPSsoqZ6+EsWU

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks