General

  • Target

    f2bf7109ed987a704e8ce08bab1aa658094076d8ab0b3e9d22d72347b29dbd86

  • Size

    7.6MB

  • Sample

    250116-xq7baavncj

  • MD5

    33a0be2253e78ae32930c903bf338d46

  • SHA1

    7ac35d3509242e9c0d757434b20524a5a17ab390

  • SHA256

    f2bf7109ed987a704e8ce08bab1aa658094076d8ab0b3e9d22d72347b29dbd86

  • SHA512

    c7429f463ff017962c82925d40719ebbc8b54b0a84bcad9dbdf8272a47094ede9f75b91911ae3d1a71d9edaebfbf3e802baeffdfb64b304fab18545ba569ca30

  • SSDEEP

    196608:j0D+kdCWwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWg:45UdIHL7HmBYXrYoaUNX

Malware Config

Targets

    • Target

      f2bf7109ed987a704e8ce08bab1aa658094076d8ab0b3e9d22d72347b29dbd86

    • Size

      7.6MB

    • MD5

      33a0be2253e78ae32930c903bf338d46

    • SHA1

      7ac35d3509242e9c0d757434b20524a5a17ab390

    • SHA256

      f2bf7109ed987a704e8ce08bab1aa658094076d8ab0b3e9d22d72347b29dbd86

    • SHA512

      c7429f463ff017962c82925d40719ebbc8b54b0a84bcad9dbdf8272a47094ede9f75b91911ae3d1a71d9edaebfbf3e802baeffdfb64b304fab18545ba569ca30

    • SSDEEP

      196608:j0D+kdCWwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWg:45UdIHL7HmBYXrYoaUNX

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks