General

  • Target

    UB.GGSpoofer.rar

  • Size

    9.6MB

  • Sample

    250105-qxefhsvrgz

  • MD5

    c5b10924c485c2b0e15f4ea9773e9318

  • SHA1

    731d0388e1b2d8d9f4ffccdcc13662846ff17537

  • SHA256

    278a351b915ea2c45a1470479c3a16d548a425dd00a9d94c97b92e1e4c42f831

  • SHA512

    7e54a0cb256a2c2a2ef1f5098bb81fdd9878eb42bc61eb78c97601c1eb05756ac82e1a909b1ccdfadfe31264597fd0b48aa27481a3ca74818279a853021bbf97

  • SSDEEP

    196608:ARnGgQKC4+Og7QCF7/SO141iZDjQ2ZglnfSVEpU0kXPb88fBwn3T:G7Q/LDRri60+KnA0kXPb88fBwnD

Malware Config

Targets

    • Target

      UB.GG Spoofer.exe

    • Size

      16.0MB

    • MD5

      69909933692a6a93aae2f88d143507a1

    • SHA1

      ff05ffae2f89a4cc36d882cffc5b52e3f82c636c

    • SHA256

      85712e3e8c631c5007a80976077339e2f284221959cb18a1ba50179d31f0b32d

    • SHA512

      a60047d13375a23230ac7187992feb7df70bc1d1b1f0e8216957a3ffba7446f834bd9d1395aa87e895e2e3dfa322705b1148d0630f303cb7e3cfc6603511ea7f

    • SSDEEP

      196608:wqDRkd3swfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWqPnRVN:Va1zIHL7HmBYXrkRoaUNPnXN

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks