General

  • Target

    Spoofer Temp.exe

  • Size

    8.4MB

  • Sample

    250112-zkf81s1mbj

  • MD5

    88c2bb446e8995d2786d8225a046bd66

  • SHA1

    24061aa7ce3e73c1f88400e9c8b399e296ce55ac

  • SHA256

    187c56294f09db0c14e49811e5f876eb3d678c7e6577972ff3d805e0e3143b80

  • SHA512

    c1f05cc8316fe00f4fc96cdbf809dccfb32d2ed87984238ef9fd8cb5cc2f5003eebe7bff0675ba55b525477abc61d2dea0dec1ddb93eacdda71c83b1b729e691

  • SSDEEP

    196608:rcDRkd32WwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWv:gaiIHL7HmBYXrkRoaUNw

Malware Config

Targets

    • Target

      Spoofer Temp.exe

    • Size

      8.4MB

    • MD5

      88c2bb446e8995d2786d8225a046bd66

    • SHA1

      24061aa7ce3e73c1f88400e9c8b399e296ce55ac

    • SHA256

      187c56294f09db0c14e49811e5f876eb3d678c7e6577972ff3d805e0e3143b80

    • SHA512

      c1f05cc8316fe00f4fc96cdbf809dccfb32d2ed87984238ef9fd8cb5cc2f5003eebe7bff0675ba55b525477abc61d2dea0dec1ddb93eacdda71c83b1b729e691

    • SSDEEP

      196608:rcDRkd32WwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWv:gaiIHL7HmBYXrkRoaUNw

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks