General
-
Target
Siphon.rar
-
Size
6.8MB
-
Sample
250111-1m56latkhm
-
MD5
94ccebaced6008adf057e49184bd7e3d
-
SHA1
e89d4d7917990e502a3b7bb0f8d2ce6fbca8036c
-
SHA256
20f245f12058b24813116066c6d289db3940d0a1c51dffbeee70e42c25b0e7cd
-
SHA512
fa10bafa28ed3d3186c1e1a270d0eb082467b8a9950b256153d2700fe018d36a90977b345bfd08de0c99a14d2fc96cdcbf8ffb19b69a9f267b315196aaad2a22
-
SSDEEP
98304:CrbCj+u9LBhcw9mVFMZmQOf1CNwveMXqSRhTRwOb6UTJbQsR0gPFIXmoAE2F/u30:OE+8LN4OOjnXqARwO+U5R7PFIV2F/z/
Behavioral task
behavioral1
Sample
Siphon/Siphon.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Siphon/Siphon.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Siphon/Siphon.exe
-
Size
6.9MB
-
MD5
1ebf01a7396663a17a9d842bf2052d4c
-
SHA1
88363e92a869652b670836eb2d1871b0ae557813
-
SHA256
5d80604581b45de99ad092eff6fc5f743f6cfa04bd2336b48cdcfbc324b33360
-
SHA512
a408e755e563e27c3ec65474320586ecdb87bbb108f8cf4d7737fcbb56d3c2a141327209d19e24ec4705a7dd16de7dbabc65be74ddfba32c20c31fdfad70eaec
-
SSDEEP
98304:l5DjWM8JEE1FqWamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIFx:l50AfeNTfm/pf+xk4dWRimrbW3jmyO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3