General
-
Target
.scr
-
Size
8.0MB
-
Sample
250105-n9dnmswkan
-
MD5
9522d463562beeb59481a422cc38aee9
-
SHA1
74065929671f545c211870d39700be01e21517fc
-
SHA256
74a9d1c6f2b3cace2c3d0f09458d6022bd8f347156cdd98d9102d815ea34b8b5
-
SHA512
a06f9d87417e838285be4a89edb7a5803e8fe04ab49f6583f0af8651e890d5727c0a38631845b81663c5c34f9ce43fed57b2083a2f396bf4d990a3a3d8ba0e1c
-
SSDEEP
196608:MiHYMZgJwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jG:PZg2IHziK1piXLGVE4Ue0VJa
Behavioral task
behavioral1
Sample
.scr
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
D�mmA�.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
.scr
-
Size
8.0MB
-
MD5
9522d463562beeb59481a422cc38aee9
-
SHA1
74065929671f545c211870d39700be01e21517fc
-
SHA256
74a9d1c6f2b3cace2c3d0f09458d6022bd8f347156cdd98d9102d815ea34b8b5
-
SHA512
a06f9d87417e838285be4a89edb7a5803e8fe04ab49f6583f0af8651e890d5727c0a38631845b81663c5c34f9ce43fed57b2083a2f396bf4d990a3a3d8ba0e1c
-
SSDEEP
196608:MiHYMZgJwfI9jUCzi4H1qSiXLGVi7DMgpZ3Q0VMwICEc/jG:PZg2IHziK1piXLGVE4Ue0VJa
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
D�mmA�.pyc
-
Size
1KB
-
MD5
3ef9925b147def610d8ee5a778aa0cf1
-
SHA1
a48cbca4f0d70c38656b030c45704acf0ebd69d5
-
SHA256
5f6588752e798cf1e75b5453550584bb43795fdbbd7fa9d7de62d319ddf59733
-
SHA512
f5fbaec5e701acb19e866a82fd3cf3d82206fd33f5fc837aac3f66787733b4a9dd5caf3565b97c3e2987c3c9d13238736277147354054858900c7458cb3fcbd2
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3