General
-
Target
fivem s7b.rar
-
Size
21.3MB
-
Sample
241225-nagagssmfl
-
MD5
02c5b9427813c0f2c60a9f23d1650413
-
SHA1
84ee5be7072ec5ba4f6013215a03c82b260649d6
-
SHA256
29f0a91279a7df7d840cc01df7c0d199e867a46a137d84425be73bf6840e2f07
-
SHA512
e8f4af28063d18cc4efd3d3caa23036d45f0727f9146c3800887f010ee2615dd8ecbb41077b1cebadf446735262d1d9e2b268fe63addfa501f1a674c66b624c3
-
SSDEEP
393216:X5j19BWC9ziZxeu06nHDeQCOYLLXeZktpQfz/qRjUPse011JqK:pjJN8xb7HSyYfe6tpwqRjw01N
Behavioral task
behavioral1
Sample
fivem s7b/start.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
fivem s7b/start.bat
-
Size
21.6MB
-
MD5
3d50186ac66012eb0c6e4d813bfcb414
-
SHA1
83102ec1333678be19a39406d53dbc89fcc25115
-
SHA256
598f12da38e0b270f3e6698112afbd1dc162b7779a6690dd11d40a6388126d8a
-
SHA512
b76d616aa1fe1b160d234babdc533723a1366771b647db211a56ab9a0bba4010db5aeb86fb59359b608b0bf34ac86001d1db3ca9bec56c63bb5fa429c0e3ff05
-
SSDEEP
393216:1aDW1AzdtCCE62fkYCicgcT/ByQVZVEt9tF7mHzqktrIHziK1piXLGVE4Ue9VJr:GW1ATCiEk1J/vVZV2/wmktuDiXHi9Lr
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1