General

  • Target

    Build.zip

  • Size

    20.9MB

  • Sample

    250106-s7yy1szqg1

  • MD5

    202c2cc945735ac0d31abe80e837f7fd

  • SHA1

    08a29149a1048a74af1752190593e5096facf595

  • SHA256

    490063206c1049e12cd3e29e7ae9a166950b48c074706aa4e45b467cc1738314

  • SHA512

    886708183358a23dfa84769bab0a7ca5a7aab2e3928fa84d88893b46fa59636391266000be96aed1e4c8edac59e76e923d194cecb0ac0ee5ce95ad9cec4fc8fe

  • SSDEEP

    393216:SuOdVhb6boN5DiEYKNvOwOGWkUURE0hZXR/uOdVhb6boN5DiEYKNvOwOGWkUUl:sLksNwjKNv2qFSEX7LksNwjKNv2qFl

Malware Config

Targets

    • Target

      Build/ArcadiaLauncher.exe

    • Size

      9.6MB

    • MD5

      935811dc5d515b089afe293d4471d215

    • SHA1

      9e7d4ec78767b94752ec657fdd7dc5a83e6d1cd8

    • SHA256

      d5be09b425b16925940fa291de9f802051e7cd366dbd6dba66742e334ef8dd90

    • SHA512

      1aa7704c31971cd84dcffc31bedeff99b97fb589a2499a0a633d3dc6f80024d9fa19c347fa12530d92c597b1ab4eb2f89b98a5a127ace1af2b49edec9d7b6647

    • SSDEEP

      196608:nd1dXlQZ5tLBxApPwfI9jUCnORird1KfbLOYgN2oc+nBIdAx3:dbiZ5tMpEIHOQ76bynnBIK

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Build/ArcadiaModule.dll

    • Size

      3.7MB

    • MD5

      963dd477745b743e2b9eb68f74d041e3

    • SHA1

      db6e33d894cc30bae3ddb15707d4548acf4d5211

    • SHA256

      53d26b675a6647691cbcde73635ccaf30771bdbe3ce626597573509a10989812

    • SHA512

      bb18b75a6c399bde20828740090732cb923c03ff0b265487bd1607fea0935ade40ae5390b74d9be0e114a081c6d522f7bbd31584b9970e36aacfac2505b08ac8

    • SSDEEP

      49152:JmL50v1uE4GyK66rxhKR6QA39miwsXw4uDkl6mUDu/eG0vHnIqAEr3:umdf1KrAIiwsXw4uDkl7au/2H

    Score
    8/10
    • Blocklisted process makes network request

    • Legitimate hosting services abused for malware hosting/C2

    • Target

      Build/ArcadiaUI.exe

    • Size

      9.6MB

    • MD5

      935811dc5d515b089afe293d4471d215

    • SHA1

      9e7d4ec78767b94752ec657fdd7dc5a83e6d1cd8

    • SHA256

      d5be09b425b16925940fa291de9f802051e7cd366dbd6dba66742e334ef8dd90

    • SHA512

      1aa7704c31971cd84dcffc31bedeff99b97fb589a2499a0a633d3dc6f80024d9fa19c347fa12530d92c597b1ab4eb2f89b98a5a127ace1af2b49edec9d7b6647

    • SSDEEP

      196608:nd1dXlQZ5tLBxApPwfI9jUCnORird1KfbLOYgN2oc+nBIdAx3:dbiZ5tMpEIHOQ76bynnBIK

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Build/FastColoredTextBox.dll

    • Size

      323KB

    • MD5

      71963eb6707ef2de595d336d5810082b

    • SHA1

      aefa3ec8411e2ad2a7f0a496be0c7f52cb908bd5

    • SHA256

      f67f8caf9216123c0f669ae7a0e9a086a28ad9fee7e4756c224a7706ceaab1cd

    • SHA512

      a2410423d7d9c730e3d7d48a03a01342149778539bc2bb32fa404d1722296eb1f0ebfc2f8224665b6e84b6e17a16cc3392334ad7958662fe9d65c6bada6a471b

    • SSDEEP

      6144:JR0J4lxA/7BA4xvNIwcKAZ+IBJhaeFMdFDCBdxBsqmLDi5eN5DDl1SqPF:JR0J4ElAovNIwxAZdBOeFMuzheN5

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks