Overview
overview
10Static
static
10Built.exe
windows7-x64
7Built.exe
windows10-2004-x64
8Built.exe
android-9-x86
Built.exe
android-10-x64
Built.exe
android-11-x64
Built.exe
macos-10.15-amd64
Built.exe
ubuntu-18.04-amd64
Built.exe
debian-9-armhf
Built.exe
debian-9-mips
Built.exe
debian-9-mipsel
.pyc
windows7-x64
.pyc
windows10-2004-x64
.pyc
android-9-x86
.pyc
android-10-x64
.pyc
android-11-x64
.pyc
macos-10.15-amd64
.pyc
ubuntu-18.04-amd64
.pyc
debian-9-armhf
.pyc
debian-9-mips
.pyc
debian-9-mipsel
General
-
Target
Built.exe
-
Size
8.2MB
-
Sample
250114-gcnn1szqen
-
MD5
3f21067af65ef164255fbee97661fd3d
-
SHA1
ffe7c3bac38f966245e3de03a7d8ac9412a74afe
-
SHA256
e89ebb7c615c2148ea5d0b81ec78421dd6e63902780eed4a078cc39fa2b65b2b
-
SHA512
3a1ff2e5b6a0d5e78036a55ff749aa9de0eeca803aad198a7ae56ecd941fecb153bb24636888396cd9f0594731a759a0b0b14c68698510b29225a2bfdeb924b8
-
SSDEEP
196608:2DRkdsRkwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWi:2aebIHL7HmBYXrkRoaUN9
Behavioral task
behavioral1
Sample
Built.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Built.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Built.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
Built.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
Built.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
Built.exe
Resource
macos-20241106-en
Behavioral task
behavioral7
Sample
Built.exe
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
Built.exe
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
Built.exe
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
Built.exe
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
.pyc
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
.pyc
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
.pyc
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral14
Sample
.pyc
Resource
android-x64-20240624-en
Behavioral task
behavioral15
Sample
.pyc
Resource
android-x64-arm64-20240910-en
Behavioral task
behavioral16
Sample
.pyc
Resource
macos-20241101-en
Behavioral task
behavioral17
Sample
.pyc
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral18
Sample
.pyc
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral19
Sample
.pyc
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral20
Sample
.pyc
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
Built.exe
-
Size
8.2MB
-
MD5
3f21067af65ef164255fbee97661fd3d
-
SHA1
ffe7c3bac38f966245e3de03a7d8ac9412a74afe
-
SHA256
e89ebb7c615c2148ea5d0b81ec78421dd6e63902780eed4a078cc39fa2b65b2b
-
SHA512
3a1ff2e5b6a0d5e78036a55ff749aa9de0eeca803aad198a7ae56ecd941fecb153bb24636888396cd9f0594731a759a0b0b14c68698510b29225a2bfdeb924b8
-
SSDEEP
196608:2DRkdsRkwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWi:2aebIHL7HmBYXrkRoaUN9
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
.pyc
-
Size
1KB
-
MD5
9d6a96aa8692dabb99b4f29756c8cb7d
-
SHA1
1df69dea83cff2852a27b4b5b66a3e16329286ce
-
SHA256
1387d73c81acd8a4667469dff5b22c18f0068afe40c14c28da7dd3835bc8f988
-
SHA512
04ad792618a88a3c9cbd2e98f1c7740d51cca1992ad4088ca02e1505995e760aae5e4bc89004eda96e77ce87a7fbe8bf0d23e66704cdbac1b6ec5e3ababf37df
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3