General
-
Target
Tiktok V2.1.zip
-
Size
7.6MB
-
Sample
241228-1gp77asmaz
-
MD5
063427fcb07bb5b8b61608edc25f92b1
-
SHA1
b3dff64fcad39e0442a59ca54a1b02ec8d896b24
-
SHA256
11df7be798ab21ac5209c2c8f8c9bdf84a4ddf1f2a539a10c626082ce6b6724c
-
SHA512
91a354410360ea01238aa44f89235b2ffccc493d9363c9fba8b58f3ae2be8f71cdab5e3cb7daafe9545c6274c2e3df19a04d082abc54d46d009d63ce239b0b9a
-
SSDEEP
196608:Qc3ZLVjw5k3tjCR3rqQ8COK5RbmfWQoc1OPhVHXnF0sF:likIhrT8pKHmockF0y
Behavioral task
behavioral1
Sample
Tiktok V2.1/Launcher.exe
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
Tiktok V2.1/Launcher.exe
-
Size
74.0MB
-
MD5
a222601e469d390b527eaa6d7796a36c
-
SHA1
a55242603debd8d361072ea91dd7da55495ab9dd
-
SHA256
b197840d57ce20b1101b0476b599c02b18f2b1ce275af0309819f7ce3f663fc3
-
SHA512
57570261d6553b5eed9ab3a5fa5808740db1e9e4bf7fb4d6433e325ec85afecdd5e99a51749ef3667cb332d298d76a297b2c7c877a68168ce68939c7835f0e4f
-
SSDEEP
196608:/IQD+kdnBwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:QQ5IIHL7HmBYXrYoaUN4
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3