General

  • Target

    RDR2-Online-V2-v2--Cheat.zip

  • Size

    7.4MB

  • Sample

    250106-q8mahazqhp

  • MD5

    f55d6171ae497154d8de874101e1405e

  • SHA1

    18d8e63324c1da69bb29c9ecde08dced7f250862

  • SHA256

    5bd1981e9a8b2c17a40c5db9a7af9e3cbbd8893bc08ea678dec0daf55efb2d59

  • SHA512

    4cb058bade66aa58fbe6fc54671facd5eff9162de64d1a2a3dc0ac7739cbf5c4de363ff335f2b5fd4f5026227cc5aa112fbc5407d5f6a5d900fd8741b6866461

  • SSDEEP

    196608:h/GKyUj/Vwvy+TGLQDkyE9+UYPco2+KNHreh3aFhAaAg:x/yUrVw6+/DkpBo2+KN6lKhvt

Malware Config

Targets

    • Target

      Dennis RDR2 Online Cheat V2.rar/Loader.exe

    • Size

      7.3MB

    • MD5

      4a8a6db2d0e2150fede36b9623402ccd

    • SHA1

      f7bc80687c3818ee723ecacc0e6611e630e805a7

    • SHA256

      1945f98ea4eeef0b062c7d8b72ed5101f648619d6e2f251ac849620641c9aafc

    • SHA512

      5fb121f1b915ce1716ea47bffc96549138f6acde3e42c3c92a1c0ef78e7ad1fcad644cb0351b5c9f5c608602d880ab47639c09a120f585224c3508ea8d8a1355

    • SSDEEP

      196608:gvYS6SOshoKMuIkhVastRL5Di3ue1D7305:CYSdOshouIkPftRL54fRE5

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks