Resubmissions

17-01-2025 22:44

250117-2nsgkavpcw 10

16-01-2025 02:54

250116-ddxrjazjgl 10

General

  • Target

    Builder.bat

  • Size

    6.0MB

  • Sample

    250116-ddxrjazjgl

  • MD5

    6e82d5096ecc9edf1ecf2260b561f957

  • SHA1

    bd9dc15e9f28c4210306ac3a12ad55ed2bf4f939

  • SHA256

    9945e87a1ca542897f02db85a4503a3d5b65de54b08be720d096c62d25e4357d

  • SHA512

    dc155597afa523f128b7e7fecd37b01005e4b32477a4137786f7772b81d06d6330a2214ac0274f7e1acd4f827e0b56ff026df01577299e446dca275d46c60765

  • SSDEEP

    98304:LaEtdFBCm/I5xamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RGOnAKt7M0Cu:LhFIm/NeN/FJMIDJf0gsAGK4RVnAKtIE

Malware Config

Targets

    • Target

      Builder.bat

    • Size

      6.0MB

    • MD5

      6e82d5096ecc9edf1ecf2260b561f957

    • SHA1

      bd9dc15e9f28c4210306ac3a12ad55ed2bf4f939

    • SHA256

      9945e87a1ca542897f02db85a4503a3d5b65de54b08be720d096c62d25e4357d

    • SHA512

      dc155597afa523f128b7e7fecd37b01005e4b32477a4137786f7772b81d06d6330a2214ac0274f7e1acd4f827e0b56ff026df01577299e446dca275d46c60765

    • SSDEEP

      98304:LaEtdFBCm/I5xamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RGOnAKt7M0Cu:LhFIm/NeN/FJMIDJf0gsAGK4RVnAKtIE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �d]T� .pyc

    • Size

      857B

    • MD5

      917bfc5b215759aa5060d5a0a95b388b

    • SHA1

      07094f8f990a2dd459692a3301ea84952ae5c1fd

    • SHA256

      d98188ad9a52808ee66a3117607f728d56c575b9b2ea0def6aaec99c38350f0f

    • SHA512

      19f4f170bf61656037dbd2f7eaef9c9f05efefc8a1cfef081e1118e7f48d76c9685f529953d2c7c5ed9b4ed2557fd3e8d420e8d695ac55dcd430a75804cfdcdd

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks