General
-
Target
Ms Optimizer.rar
-
Size
7.5MB
-
Sample
250101-sj8tbazjgt
-
MD5
24070930e012ed85eaecbf9cb60b2910
-
SHA1
abe37ec45c9387538d93f9f3f24ce212e711f204
-
SHA256
0ff7a5b5bedeac0e43dfc0779ba19d96357871631043d5b9243c24bc743c9029
-
SHA512
176a59ecf6179de7c38f1c8d3d5a1901c514087c0fa6b06b865b3c72be1cfd9c34f82d0beb727db028e14dfa2d92b687bcacaa1e59be1a8ef4fceaf02681360e
-
SSDEEP
196608:oyUrYorj3f/9LoEyOULkTS7ys3r3wb3IhGfLjSvx5:of9xDxULkTobuwqWv7
Behavioral task
behavioral1
Sample
Ms Optimizer.exe
Resource
win10ltsc2021-20241023-en
Malware Config
Targets
-
-
Target
Ms Optimizer.exe
-
Size
30.0MB
-
MD5
58b7ee8f89ce798c07c7585d41d4b293
-
SHA1
24adc394aa3de92844bba052c25866ce01bdca41
-
SHA256
ed386a79e63463746364bd5217a6ae32bd27961ba9701fa50a55ec6745c1558e
-
SHA512
cdc3673977266c904fbf7ae2aba6dfa9850cda82abbb6465db19d49406a8f2c5b1dca9c9c567f6666d83cef82e3a310f6af5af09f846cbb4e369bea1f2e784d5
-
SSDEEP
196608:HDD+kd1wfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWY:j5QIHL7HmBYXrYoaUNP
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3