General

  • Target

    cheat.rar

  • Size

    7.6MB

  • Sample

    250109-ldngvswkht

  • MD5

    b1bb8577a797627718749d65ad3128d5

  • SHA1

    36273146ea48387950752f53a34e491bcdd9d239

  • SHA256

    95de6273efde66a19af7ab5c63b14b6256bb62226db4f28fb79875641dfb68b5

  • SHA512

    a971ebc6ca4adcb99e2366a4772e33d528f60b31b9d45d3fa6234e40e5648985e519c0656ce6cc96255059ed893bdfb79b42b34915f969ddd4f396863a33b4cc

  • SSDEEP

    196608:G8tM5e9BwDYsgDRLG3P+sarXtJTjG3k13f4RFdKe/vNlt:G8tSDYXF63P+sarXq3k13/e/vNlt

Malware Config

Targets

    • Target

      cheat.exe

    • Size

      10.0MB

    • MD5

      2ffd878c5c9dca41f147e0e0fc0a6d35

    • SHA1

      96697b119909c1f04cb5ac8f4dca34df08126c7f

    • SHA256

      5740a9e3eaa603b2e9f86932df5ab6b59f8baab82163a163343c9f46825a6849

    • SHA512

      0eb5487ce01d927a297d8ee6e1e0a3cb0313f3824ddef33a896bd9786921c502bd86cebcb8a810523bb971e225ef2e8ded2920bb119faa7f5f5a420a669ca8be

    • SSDEEP

      196608:Vo0lTceNTfm/pf+xk4dGWV3RimrbW3jmyZ:FHy/pWu4EWVRimrbmyC

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks