General

  • Target

    KashBeams.exe

  • Size

    7.5MB

  • Sample

    250111-cdeehsxrfy

  • MD5

    309098a7fec40953d398abfd44794952

  • SHA1

    031947e64a71a5ff9c5589c6cddcb26742cfd7c6

  • SHA256

    10bf2019e3d2932957027a5caac24a04424ec014f87e08eefd53ae85176c70e9

  • SHA512

    2567ca1482ecf65eb7aab2e50274b87999fc8c5add37fcfc2a259df323a5761178b326dd240e1446a906eb7a8f739dbf0118d61ac72a9f85b78224736523b34f

  • SSDEEP

    196608:7qLjv+bhqNVoBLD7fEXEoYbiIv9pvvk9fIiZ1jT:KL+9qz8LD7fEUbiIqQgpT

Malware Config

Targets

    • Target

      KashBeams.exe

    • Size

      7.5MB

    • MD5

      309098a7fec40953d398abfd44794952

    • SHA1

      031947e64a71a5ff9c5589c6cddcb26742cfd7c6

    • SHA256

      10bf2019e3d2932957027a5caac24a04424ec014f87e08eefd53ae85176c70e9

    • SHA512

      2567ca1482ecf65eb7aab2e50274b87999fc8c5add37fcfc2a259df323a5761178b326dd240e1446a906eb7a8f739dbf0118d61ac72a9f85b78224736523b34f

    • SSDEEP

      196608:7qLjv+bhqNVoBLD7fEXEoYbiIv9pvvk9fIiZ1jT:KL+9qz8LD7fEUbiIqQgpT

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks