General

  • Target

    OW2.exe

  • Size

    6.9MB

  • Sample

    241226-wlgpdstmgl

  • MD5

    e3c2ac2c290e7117c9f714614190b178

  • SHA1

    d2b9f9651ea1b15f208773fa44c00456a27f6782

  • SHA256

    cc1fed3e4867200d6442f21d0ee2e918c2e74ee4a32e45ce5d55c9a237160d6d

  • SHA512

    adcf8389b524b9ea19aba17759732a4a67528752c10ff65c982a81a66d65f9ab0409e5097f80e958a159b4fe90e0055fa6f9b9113d9ba54db54e32cf7d7332e5

  • SSDEEP

    98304:drx1DjWM8JEE1r/GamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEa:drx10neNTfm/pf+xk4dWRGtrbWOjgWyE

Malware Config

Targets

    • Target

      OW2.exe

    • Size

      6.9MB

    • MD5

      e3c2ac2c290e7117c9f714614190b178

    • SHA1

      d2b9f9651ea1b15f208773fa44c00456a27f6782

    • SHA256

      cc1fed3e4867200d6442f21d0ee2e918c2e74ee4a32e45ce5d55c9a237160d6d

    • SHA512

      adcf8389b524b9ea19aba17759732a4a67528752c10ff65c982a81a66d65f9ab0409e5097f80e958a159b4fe90e0055fa6f9b9113d9ba54db54e32cf7d7332e5

    • SSDEEP

      98304:drx1DjWM8JEE1r/GamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRGYKJJcGhEa:drx10neNTfm/pf+xk4dWRGtrbWOjgWyE

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �=,�99D.pyc

    • Size

      1KB

    • MD5

      c311eb3ea207c4120b92e59bc0e3a025

    • SHA1

      148f0321ed0616a261ab793afea4e4c71257b033

    • SHA256

      07f80b8ed1ac4fc4227d7c2ee0b835de897ece6fdd822d0f278a4d249eb5a153

    • SHA512

      70303b10328a2974de261298eb1bbe045116ab6a6db956f182635148eb9f6570acff3432e008e27eb929ed64f75ee9b8ffce0c73a33dfe86fdc837b207242c01

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks