General

  • Target

    Built.exe

  • Size

    6.0MB

  • Sample

    250108-xvcmgazjes

  • MD5

    cf6fc2aea60b6d65dcc9c16166c8161a

  • SHA1

    49ee49aab7c17b2a518c521a6c46a973e2d95789

  • SHA256

    90ef4db2ed060ca10c77de5cac4c09ef26c5470bba68a943547bc4fb35256070

  • SHA512

    4157a93fefbfcb4ede0f34427d3c3cd901d829d9412c9efd007cc1761af2b3b5f5bd502746944603cb1740f4f49a2c583ca4560f06a6b428c13b2eba0648ec87

  • SSDEEP

    98304:6rIu4+Dcd/amaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HBMG23kMWcZ:60p+DmieNoInY7/sHfbRy9uGOWsX9Tb

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.0MB

    • MD5

      cf6fc2aea60b6d65dcc9c16166c8161a

    • SHA1

      49ee49aab7c17b2a518c521a6c46a973e2d95789

    • SHA256

      90ef4db2ed060ca10c77de5cac4c09ef26c5470bba68a943547bc4fb35256070

    • SHA512

      4157a93fefbfcb4ede0f34427d3c3cd901d829d9412c9efd007cc1761af2b3b5f5bd502746944603cb1740f4f49a2c583ca4560f06a6b428c13b2eba0648ec87

    • SSDEEP

      98304:6rIu4+Dcd/amaHl3Ne4i3gDUZnhhM7M+yvFaW9cIzaF6ARwDtyDe2HBMG23kMWcZ:60p+DmieNoInY7/sHfbRy9uGOWsX9Tb

    • Browser stealer detected.

      Likely to steal browser information like cookies, passwords or sessions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks