General

  • Target

    20529030842.zip

  • Size

    7.4MB

  • Sample

    241226-n57qxsvpap

  • MD5

    fb69feb60d4c263ab65b16de3f5bfc46

  • SHA1

    1a15db4e8d783b70916c249e496b7fc8890e99e2

  • SHA256

    a31b9d52273fe48f0c521a28183950d5d73bc305c74e6bc022119511308badd1

  • SHA512

    ca769bb48a00cbf8305a12e6de8ed2e1a695a22d0353b27a173a09b1fc7af9bcbd59420a2ef1343b9868186b89ff627f1ac2b0e3762966111153062c6d970597

  • SSDEEP

    196608:C/ou0w2SzHzABvDP+nov5u6RiTcJJtP5inm5J:CiPczQ7Ua4a3P5fJ

Malware Config

Targets

    • Target

      8ae3b874bcd842a4349864e3fbdbe32c92d1c48e87482ce3687e92557e411bb9

    • Size

      7.5MB

    • MD5

      a658cc6914ca29731c3b5ebcecdda5a3

    • SHA1

      274ffb5affd16e672736f517669870193f7c9544

    • SHA256

      8ae3b874bcd842a4349864e3fbdbe32c92d1c48e87482ce3687e92557e411bb9

    • SHA512

      a68680d6f18009185b6c45502f13ad5f2b04dbeb241705de16534f4ccc800d8f726dd7528da6b5e3674589fbd9fd3f671def4bcc83531bb2075e2e50e27bbeb9

    • SSDEEP

      196608:7dunqZMNwfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSw:8sIH2XgHq+jq93Yoh

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks