General

  • Target

    injector nova.exe

  • Size

    7.6MB

  • Sample

    250109-sqpc9avpbj

  • MD5

    cebf49e54d37132a17f613eee8b7a8fb

  • SHA1

    597eb7b2408b85182f2b40cdb83852605bd2e841

  • SHA256

    205c84f75b64218d83eda868f4118722c7f2b7f97dcbc9bf35bed2947cf9ba2b

  • SHA512

    8f0d12d8cdf4a977c5a3407aa3faa26c73a5bc9a42f4ff175e8808876eaf16a2b9fec89c6c9334fcb275203c90fc3b0e10a236c8b4a3e9729d64ae48a9614eb1

  • SSDEEP

    196608:Xu+YS6x0MOshoKMuIkhVastRL5Di3ue1D730I:VYSU0MOshouIkPftRL54fREI

Malware Config

Targets

    • Target

      injector nova.exe

    • Size

      7.6MB

    • MD5

      cebf49e54d37132a17f613eee8b7a8fb

    • SHA1

      597eb7b2408b85182f2b40cdb83852605bd2e841

    • SHA256

      205c84f75b64218d83eda868f4118722c7f2b7f97dcbc9bf35bed2947cf9ba2b

    • SHA512

      8f0d12d8cdf4a977c5a3407aa3faa26c73a5bc9a42f4ff175e8808876eaf16a2b9fec89c6c9334fcb275203c90fc3b0e10a236c8b4a3e9729d64ae48a9614eb1

    • SSDEEP

      196608:Xu+YS6x0MOshoKMuIkhVastRL5Di3ue1D730I:VYSU0MOshouIkPftRL54fREI

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks