General
-
Target
Nova.exe
-
Size
7.7MB
-
Sample
241229-vrtqgavmcx
-
MD5
af6415de69e4e824d6213d1bf4ba329c
-
SHA1
d3b58e8472f7fd9d690f689346b5ec6b06a8ce39
-
SHA256
594bb34f3ca93d8d6c3551f12e106db2c7d4f6af2ab4307fa9f2943838dd7af9
-
SHA512
70eb82a6712e8264b514447db048336dd379190f0e934f8ba96d456526250c16a1e9493adaf580aaf2ef7d4ff52be9530be5835b5b9f5bb54afb9227a3913f45
-
SSDEEP
196608:DeD+kdpwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWi:i5QIHL7HmBYXrYoaUNR
Behavioral task
behavioral1
Sample
Nova.exe
Resource
win10ltsc2021-20241211-en
Malware Config
Targets
-
-
Target
Nova.exe
-
Size
7.7MB
-
MD5
af6415de69e4e824d6213d1bf4ba329c
-
SHA1
d3b58e8472f7fd9d690f689346b5ec6b06a8ce39
-
SHA256
594bb34f3ca93d8d6c3551f12e106db2c7d4f6af2ab4307fa9f2943838dd7af9
-
SHA512
70eb82a6712e8264b514447db048336dd379190f0e934f8ba96d456526250c16a1e9493adaf580aaf2ef7d4ff52be9530be5835b5b9f5bb54afb9227a3913f45
-
SSDEEP
196608:DeD+kdpwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWi:i5QIHL7HmBYXrYoaUNR
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1