General

  • Target

    cheatinfected.zip

  • Size

    7.6MB

  • Sample

    250113-fdmyfawpbz

  • MD5

    77c9d9a49ea0c2db6523c4da3604ad9f

  • SHA1

    5ca9b5f974bf0146c5cebabb3c7049849d6435e3

  • SHA256

    6bf1daad846fc87fe65a1487eed19f64a71f597ca4850c4b3fab371bfcd6749d

  • SHA512

    30c05613d072db77eed37d884fb94443d90676f809b4d7fb6d4031acf45cf1f377bd75f30282d6681f3b9c2fbb759916b40c388cedf4d8082546fb99e1681051

  • SSDEEP

    98304:plDmwWAjrnic29OD4U1nNoXZcKcvxPhhFs1vX7r8N2hkjRNRNOh7BOogAHESVaTm:plDlxqgmcK0fmL8xjRNRNOjgqZVM3eyy

Malware Config

Targets

    • Target

      cheat.exe

    • Size

      10.0MB

    • MD5

      2ffd878c5c9dca41f147e0e0fc0a6d35

    • SHA1

      96697b119909c1f04cb5ac8f4dca34df08126c7f

    • SHA256

      5740a9e3eaa603b2e9f86932df5ab6b59f8baab82163a163343c9f46825a6849

    • SHA512

      0eb5487ce01d927a297d8ee6e1e0a3cb0313f3824ddef33a896bd9786921c502bd86cebcb8a810523bb971e225ef2e8ded2920bb119faa7f5f5a420a669ca8be

    • SSDEEP

      196608:Vo0lTceNTfm/pf+xk4dGWV3RimrbW3jmyZ:FHy/pWu4EWVRimrbmyC

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks