General
-
Target
cheat.rar
-
Size
7.6MB
-
Sample
250109-ldngvswkht
-
MD5
b1bb8577a797627718749d65ad3128d5
-
SHA1
36273146ea48387950752f53a34e491bcdd9d239
-
SHA256
95de6273efde66a19af7ab5c63b14b6256bb62226db4f28fb79875641dfb68b5
-
SHA512
a971ebc6ca4adcb99e2366a4772e33d528f60b31b9d45d3fa6234e40e5648985e519c0656ce6cc96255059ed893bdfb79b42b34915f969ddd4f396863a33b4cc
-
SSDEEP
196608:G8tM5e9BwDYsgDRLG3P+sarXtJTjG3k13f4RFdKe/vNlt:G8tSDYXF63P+sarXq3k13/e/vNlt
Behavioral task
behavioral1
Sample
cheat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cheat.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
cheat.exe
-
Size
10.0MB
-
MD5
2ffd878c5c9dca41f147e0e0fc0a6d35
-
SHA1
96697b119909c1f04cb5ac8f4dca34df08126c7f
-
SHA256
5740a9e3eaa603b2e9f86932df5ab6b59f8baab82163a163343c9f46825a6849
-
SHA512
0eb5487ce01d927a297d8ee6e1e0a3cb0313f3824ddef33a896bd9786921c502bd86cebcb8a810523bb971e225ef2e8ded2920bb119faa7f5f5a420a669ca8be
-
SSDEEP
196608:Vo0lTceNTfm/pf+xk4dGWV3RimrbW3jmyZ:FHy/pWu4EWVRimrbmyC
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3