General

  • Target

    mcgen.rar

  • Size

    19.0MB

  • Sample

    241226-r1x8gayjar

  • MD5

    b67a5f35ed542c369e835f8be5284c2d

  • SHA1

    79b35c448e50f8c0ac394cb65ebb06abe108e2d9

  • SHA256

    dad787dc4c81a0c8d1434bdeeb04e20608d651af275bb2a5ae2f2d910f791871

  • SHA512

    0afb7969e89b8e94096f4db844284425af6992bb46b7344baa265af7a96e01b0bf782592f012a801fa5bb87045728fb2b33efc9d510d3d76b73385b8eb9b93e8

  • SSDEEP

    393216:9b8dgafGWggNHuYZqC0FmVR4COoD9MCmbkthGwe/iuQ2qxBLJF+ysFBEkqP1YHLF:9b9afGx1W0FmVR4TtAtQ7QJF+XFBWYHB

Malware Config

Targets

    • Target

      mcgen.exe

    • Size

      19.2MB

    • MD5

      133615a761f85b6dc65e1f0bace55ad6

    • SHA1

      22318ecd3f75c896c16b22e360af6c2defef620d

    • SHA256

      8c003ad62d2c72a11c2f206f7026cc71423464129310f2d9f2cb2a2e34357a54

    • SHA512

      ff78d0cd524106e1e152511bbd66ef097de2d27c623fc95f6d022b0c5fcb9141491d0b875dc8f89be2ed592c63de45bd89cfeef697ac4015872dbe2186553d40

    • SSDEEP

      393216:u5Sustwj+uQP8AHF50vKYqVtqJeoKUylS4/IHL7HmBYXrYSaUNf:FuawjQVHF5//cV6BYESaQf

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks