General

  • Target

    Builder.bat

  • Size

    6.0MB

  • Sample

    250116-dgnysszlan

  • MD5

    6e82d5096ecc9edf1ecf2260b561f957

  • SHA1

    bd9dc15e9f28c4210306ac3a12ad55ed2bf4f939

  • SHA256

    9945e87a1ca542897f02db85a4503a3d5b65de54b08be720d096c62d25e4357d

  • SHA512

    dc155597afa523f128b7e7fecd37b01005e4b32477a4137786f7772b81d06d6330a2214ac0274f7e1acd4f827e0b56ff026df01577299e446dca275d46c60765

  • SSDEEP

    98304:LaEtdFBCm/I5xamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RGOnAKt7M0Cu:LhFIm/NeN/FJMIDJf0gsAGK4RVnAKtIE

Malware Config

Targets

    • Target

      Builder.bat

    • Size

      6.0MB

    • MD5

      6e82d5096ecc9edf1ecf2260b561f957

    • SHA1

      bd9dc15e9f28c4210306ac3a12ad55ed2bf4f939

    • SHA256

      9945e87a1ca542897f02db85a4503a3d5b65de54b08be720d096c62d25e4357d

    • SHA512

      dc155597afa523f128b7e7fecd37b01005e4b32477a4137786f7772b81d06d6330a2214ac0274f7e1acd4f827e0b56ff026df01577299e446dca275d46c60765

    • SSDEEP

      98304:LaEtdFBCm/I5xamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RGOnAKt7M0Cu:LhFIm/NeN/FJMIDJf0gsAGK4RVnAKtIE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks