General

  • Target

    EspKey.exe

  • Size

    18.0MB

  • Sample

    250109-xz5ttayjh1

  • MD5

    aed852ad5cf00f9c3a613e97b20a1fc4

  • SHA1

    f09ba83fe4dadcd8f29d5622016f3b857a94fa2b

  • SHA256

    55d5e0fe144b5f3e8f0feb61ad4860f4eda2fcbe3635ba10090be657702a4572

  • SHA512

    67b0374b406b37867194974740636d0ad42c8e7e1faa78213f5d5f87cc6a5b0de5d7a7fa42f8a807ace4b0b04cd8cf6dfc2c7c5b4db570bb54ef85d8a5a2a375

  • SSDEEP

    196608:MnDRkd3wfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWQ:Ea+IHL7HmBYXrkRoaUNH

Malware Config

Targets

    • Target

      EspKey.exe

    • Size

      18.0MB

    • MD5

      aed852ad5cf00f9c3a613e97b20a1fc4

    • SHA1

      f09ba83fe4dadcd8f29d5622016f3b857a94fa2b

    • SHA256

      55d5e0fe144b5f3e8f0feb61ad4860f4eda2fcbe3635ba10090be657702a4572

    • SHA512

      67b0374b406b37867194974740636d0ad42c8e7e1faa78213f5d5f87cc6a5b0de5d7a7fa42f8a807ace4b0b04cd8cf6dfc2c7c5b4db570bb54ef85d8a5a2a375

    • SSDEEP

      196608:MnDRkd3wfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWQ:Ea+IHL7HmBYXrkRoaUNH

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks