General

  • Target

    tool.rar

  • Size

    5.7MB

  • Sample

    241226-ekkwzswpfr

  • MD5

    53e784d6a4985bec69eb8db41db8550f

  • SHA1

    5248d2fc80645a9d19e0df03076e5fe714e0914d

  • SHA256

    ae0dc20b4d9ec8d0ceb4727295f2012972d40cf98bc18ef32a2a8472b7ead1c9

  • SHA512

    539ad193e2e5ec04c669bb29f8960ddc769d9ee6a116d320b0a95dfaa75e0c5763ee1ed3de781e04d7a1bd782a4a1425fe05e078450c2be7ceb0c2146ac64b22

  • SSDEEP

    98304:2spH6wt49swwBO2RhWhjkRF8MR+XkneMW82jZXbe4V8cpFRmL1uGa7lNajfWinCS:ZBb49swwBOu9RF+geIerV8cfi1mxNaDP

Malware Config

Targets

    • Target

      toll.exe

    • Size

      5.9MB

    • MD5

      690c1d163b35c2ca9989403127c5d500

    • SHA1

      3954611bdfe65457117ff542cc2125dc904ef113

    • SHA256

      a2b568fbc6537cb9f18c090a092ca1cecc2e96a635ef8c7ac6c3ff1ff755acba

    • SHA512

      5afb5c471de18054cdd34fc253a5400805e480906fb75b005e6e1a702badbeb16c1401f2683efe2afbb9a1fc00a8277f2c81a72090c32e5042cba64fbdc14e62

    • SSDEEP

      98304:F2+nh2M0i65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFK9hJkrF/6Vi:F9nGDOYjJlpZstQoS9Hf12VKXlbJCAVA

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks