General

  • Target

    Built.exe

  • Size

    7.6MB

  • Sample

    241229-3dyfhazpcy

  • MD5

    7882d1c82b3fed89549f27984fb9b453

  • SHA1

    5cd9dabc912efc4125395865963f6af944f17d7a

  • SHA256

    00c24319f2b795defd717e9f5a93a37a1876eaa5c02c6630c5e0234f818e8898

  • SHA512

    01fb0cb882dde12bfeb5c36b7eac5eb38e1723c661e5ab875387bd775f30044ba5d246a3a9beeff0fd759e711f87bfaaf0d2ef833b454165eca4611f912ef8ab

  • SSDEEP

    196608:aMD+kdglxwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWQ:/5GcIHL7HmBYXrYoaUNH

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.6MB

    • MD5

      7882d1c82b3fed89549f27984fb9b453

    • SHA1

      5cd9dabc912efc4125395865963f6af944f17d7a

    • SHA256

      00c24319f2b795defd717e9f5a93a37a1876eaa5c02c6630c5e0234f818e8898

    • SHA512

      01fb0cb882dde12bfeb5c36b7eac5eb38e1723c661e5ab875387bd775f30044ba5d246a3a9beeff0fd759e711f87bfaaf0d2ef833b454165eca4611f912ef8ab

    • SSDEEP

      196608:aMD+kdglxwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWQ:/5GcIHL7HmBYXrYoaUNH

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks