General

  • Target

    xray.exe

  • Size

    5.9MB

  • Sample

    250111-jggglstnfk

  • MD5

    08eca9171f36a8870b914cc3483289ad

  • SHA1

    ad19c17528e1729fcc886b81a75459fa166e8333

  • SHA256

    be86be2ed524d887a9fb5915be201c5f45c8fb40cac116b3156fca4c65e562be

  • SHA512

    4771a72151ddafd37c06bbf1e3c4f4a4a0273bf37aac5fc2827aad15a30eee86793885450b8fbb0b368bf752770032340ccc5a570383deb8679577442b205b72

  • SSDEEP

    98304:GEmoDUN43Wlmk3ZjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aitMr:GEumWzOjmFwDRxtYSHdK34kdai7bN3ml

Malware Config

Targets

    • Target

      xray.exe

    • Size

      5.9MB

    • MD5

      08eca9171f36a8870b914cc3483289ad

    • SHA1

      ad19c17528e1729fcc886b81a75459fa166e8333

    • SHA256

      be86be2ed524d887a9fb5915be201c5f45c8fb40cac116b3156fca4c65e562be

    • SHA512

      4771a72151ddafd37c06bbf1e3c4f4a4a0273bf37aac5fc2827aad15a30eee86793885450b8fbb0b368bf752770032340ccc5a570383deb8679577442b205b72

    • SSDEEP

      98304:GEmoDUN43Wlmk3ZjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aitMr:GEumWzOjmFwDRxtYSHdK34kdai7bN3ml

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ��)4� .pyc

    • Size

      857B

    • MD5

      4e0b0d9b2006e24121c0057ba3869cbd

    • SHA1

      699f7be23967a8bf8b27788e6fca11cf172b8f53

    • SHA256

      974d9a11bceeeafa96cfa21e9206872a1a87c66141b0007ee03f791eba45e5e3

    • SHA512

      248fb12e306a12959565f7c53554e5b50060cc8e70e7ba5c8b1ebace7cc0465feca0ee88883f3baf3f1336bdfa8b4bfafe95a40f769d01e1ba67e0431d470d9d

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks