Resubmissions

02-01-2025 19:50

250102-ykqxsawpfr 10

02-01-2025 19:48

250102-yjh6jstlbz 10

02-01-2025 19:44

250102-yf88katkav 10

General

  • Target

    Mod-EscapeService.exe

  • Size

    7.6MB

  • Sample

    250102-yf88katkav

  • MD5

    4dd6dfdcc5ed78223d86f1732c7e1db0

  • SHA1

    acabd58b86e64d1b919bb82ad774df53dfaa369d

  • SHA256

    f73cfbfe34f96372a1e5aa3cb588492d81ee086fd2acc58241d1374a2873517a

  • SHA512

    e981998d5b1c8c39f05016620c26e9c689bc898ce74d6d92eb3e304fafb118d1317066876cf94be72535b5771fe999624cb621cd86b4fcb9c40ee395bf54b315

  • SSDEEP

    196608:BAHYSwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q9VMwICEc/X3:3IHziK1piXLGVE4Ue9VJP

Malware Config

Targets

    • Target

      Mod-EscapeService.exe

    • Size

      7.6MB

    • MD5

      4dd6dfdcc5ed78223d86f1732c7e1db0

    • SHA1

      acabd58b86e64d1b919bb82ad774df53dfaa369d

    • SHA256

      f73cfbfe34f96372a1e5aa3cb588492d81ee086fd2acc58241d1374a2873517a

    • SHA512

      e981998d5b1c8c39f05016620c26e9c689bc898ce74d6d92eb3e304fafb118d1317066876cf94be72535b5771fe999624cb621cd86b4fcb9c40ee395bf54b315

    • SSDEEP

      196608:BAHYSwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q9VMwICEc/X3:3IHziK1piXLGVE4Ue9VJP

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks