Resubmissions

27-12-2024 11:03

241227-m5nglsvjcw 10

General

  • Target

    Loader.exe

  • Size

    7.2MB

  • Sample

    241227-m5nglsvjcw

  • MD5

    88b6888db4935730fe86182c37890a7b

  • SHA1

    b4fd892ab4fce341d332f79879eaab6494d4c8f0

  • SHA256

    81269a4972e543f6036b398a4196689d9a0d3dc4a8136d63e9a8bf3e752b3e89

  • SHA512

    799d7b429e7c640b9bd3228452537b1541526c8734b5074ecae204a879ceef5f1b6bbbb5700b0ce0f15db15a9743bf90b18d202280b6ccb2c6a9c56813e8b133

  • SSDEEP

    196608:rfFhIsE8eN/FJMIDJf0gsAGK5SEQR5qRjaYXOFGP:fPED/Fqyf0gsfN5qRjPow

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.2MB

    • MD5

      88b6888db4935730fe86182c37890a7b

    • SHA1

      b4fd892ab4fce341d332f79879eaab6494d4c8f0

    • SHA256

      81269a4972e543f6036b398a4196689d9a0d3dc4a8136d63e9a8bf3e752b3e89

    • SHA512

      799d7b429e7c640b9bd3228452537b1541526c8734b5074ecae204a879ceef5f1b6bbbb5700b0ce0f15db15a9743bf90b18d202280b6ccb2c6a9c56813e8b133

    • SSDEEP

      196608:rfFhIsE8eN/FJMIDJf0gsAGK5SEQR5qRjaYXOFGP:fPED/Fqyf0gsfN5qRjPow

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks