General

  • Target

    Tiktok V2.1.zip

  • Size

    7.6MB

  • Sample

    241228-1gp77asmaz

  • MD5

    063427fcb07bb5b8b61608edc25f92b1

  • SHA1

    b3dff64fcad39e0442a59ca54a1b02ec8d896b24

  • SHA256

    11df7be798ab21ac5209c2c8f8c9bdf84a4ddf1f2a539a10c626082ce6b6724c

  • SHA512

    91a354410360ea01238aa44f89235b2ffccc493d9363c9fba8b58f3ae2be8f71cdab5e3cb7daafe9545c6274c2e3df19a04d082abc54d46d009d63ce239b0b9a

  • SSDEEP

    196608:Qc3ZLVjw5k3tjCR3rqQ8COK5RbmfWQoc1OPhVHXnF0sF:likIhrT8pKHmockF0y

Malware Config

Targets

    • Target

      Tiktok V2.1/Launcher.exe

    • Size

      74.0MB

    • MD5

      a222601e469d390b527eaa6d7796a36c

    • SHA1

      a55242603debd8d361072ea91dd7da55495ab9dd

    • SHA256

      b197840d57ce20b1101b0476b599c02b18f2b1ce275af0309819f7ce3f663fc3

    • SHA512

      57570261d6553b5eed9ab3a5fa5808740db1e9e4bf7fb4d6433e325ec85afecdd5e99a51749ef3667cb332d298d76a297b2c7c877a68168ce68939c7835f0e4f

    • SSDEEP

      196608:/IQD+kdnBwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:QQ5IIHL7HmBYXrYoaUN4

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks