Resubmissions

16-01-2025 13:24

250116-qnf8ratjbj 10

16-01-2025 13:23

250116-qmsv6asrgm 10

General

  • Target

    bliss-anticheat.exe

  • Size

    6.7MB

  • Sample

    250116-qnf8ratjbj

  • MD5

    cf229d85dfbcd3f6cdbdc284f11e8ce8

  • SHA1

    d70c63884576a18c4a47d1abef81c0248c905a3b

  • SHA256

    cf9e1d3123926425ca2d05227cbfe854cb5fa2d9aa3cf9ee4eda5fde10ac5a93

  • SHA512

    9224bf4ae4fcd4971733f1bfd428b66583e8484db5011546008c661039d0e4181eb33293e9ba74adbefc572ad0d39b7ad2ddb34a689bc85c661cded1219bbb85

  • SSDEEP

    196608:UTFbeN/FJMIDJf0gsAGKhiC0BRkqRjFDbv9Tr:v/Fqyf0gsEiC03kqRjtL9f

Malware Config

Targets

    • Target

      bliss-anticheat.exe

    • Size

      6.7MB

    • MD5

      cf229d85dfbcd3f6cdbdc284f11e8ce8

    • SHA1

      d70c63884576a18c4a47d1abef81c0248c905a3b

    • SHA256

      cf9e1d3123926425ca2d05227cbfe854cb5fa2d9aa3cf9ee4eda5fde10ac5a93

    • SHA512

      9224bf4ae4fcd4971733f1bfd428b66583e8484db5011546008c661039d0e4181eb33293e9ba74adbefc572ad0d39b7ad2ddb34a689bc85c661cded1219bbb85

    • SSDEEP

      196608:UTFbeN/FJMIDJf0gsAGKhiC0BRkqRjFDbv9Tr:v/Fqyf0gsEiC03kqRjtL9f

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      ���U @�.pyc

    • Size

      857B

    • MD5

      75b9e6eafb12d45c6f14b394846352f1

    • SHA1

      055553fa7558f416528799274cbaefe612b43d74

    • SHA256

      3fead3146a3c83ce1dea07f0ef788a28ce7c27ede41c1e21fdc32199231e7dbf

    • SHA512

      888001ad2dc3fdd5c532e5a843f8d3e9f4fa4ca2b43e4f12e0ca6f2ca8d233e8f2aeab4c9e9bf1e36be7b781b7d3488bc107450f9271043a6d8d015f5518faf5

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks