General
-
Target
IMAGE TOKEN GRABBER.rar
-
Size
5.9MB
-
Sample
250110-2bdgwatjam
-
MD5
d1d47c9f3679ae22afd439c319cb73f3
-
SHA1
c015a560c1a60d9e3ed3c973dfdbc340bf9ffd3f
-
SHA256
ef2ecea56553439729a13159eb10199585d361657234ee315ea24c111681f3fb
-
SHA512
7cd00de7e4fe30d8d42d5fbaf7c26f3397b4e3ce687f9fae35fe28e2e3e4a58c16ec9159ef17666ee23b52734b0d80dac970f7482a409eb9afdb78863651ae3b
-
SSDEEP
98304:qnhOE1Enp2A2wfvNKHrAL7DUJ3E9vKFZlJZBt4wtfvk5JmBrkO/kXqH5AcSX:qh+npOQL7UECF/JjznBrkO/k6H5q
Behavioral task
behavioral1
Sample
Builder.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Builder.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Builder.bat
-
Size
6.0MB
-
MD5
6092f1af8b97cf7473867d7a862ca8da
-
SHA1
797a67c3773c8c1586cff230dfd3a433320cc475
-
SHA256
3c52eee886ac12d144085aace5f610feb43b389c8fbf8ec3a46ad4fe57361fb9
-
SHA512
cf194ea83d4f654b613a567298dcad7a034df5e46473d372add4cbaca008f4f6ef2d39675c72ae018c9f55700d17a1d84903280582fc787b997e0256944e9ba1
-
SSDEEP
98304:0tEtdFBCm/I5Kr2amaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RtOnAKEMJK:0EFIm/n/eN/FJMIDJf0gsAGK4RonAKEL
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3