General
-
Target
Cypkoland 2077.exe
-
Size
6.1MB
-
Sample
250117-2mbsesvnhv
-
MD5
07032b0b26256766fc5f92272cfb73dc
-
SHA1
c800d8dbb06749cb908b4adb6e8bb268469ef1ff
-
SHA256
bd01c97b0ff81284694b8fa5745afc08fa11fa240c1ceb3c7a44323d04e1c8dd
-
SHA512
ce8163cc97a1f13d8782d095dfa9cfe0ab80bfd7f6f98bec6ada516f16b77c74840d5d15a17f664d56b63f1c6b7b999df97fecff1b4ea1c5f02ddd76c61bace0
-
SSDEEP
98304:mLhjEtdFBgwQamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RSPMtF93hMAl:mV6FLeN/FJMIDJf0gsAGK4RSktyAl
Behavioral task
behavioral1
Sample
Cypkoland 2077.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Cypkoland 2077.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
[�f�bPW.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
[�f�bPW.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Cypkoland 2077.exe
-
Size
6.1MB
-
MD5
07032b0b26256766fc5f92272cfb73dc
-
SHA1
c800d8dbb06749cb908b4adb6e8bb268469ef1ff
-
SHA256
bd01c97b0ff81284694b8fa5745afc08fa11fa240c1ceb3c7a44323d04e1c8dd
-
SHA512
ce8163cc97a1f13d8782d095dfa9cfe0ab80bfd7f6f98bec6ada516f16b77c74840d5d15a17f664d56b63f1c6b7b999df97fecff1b4ea1c5f02ddd76c61bace0
-
SSDEEP
98304:mLhjEtdFBgwQamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RSPMtF93hMAl:mV6FLeN/FJMIDJf0gsAGK4RSktyAl
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
[�f�bPW.pyc
-
Size
857B
-
MD5
8abfb1a94c55a11f4ad19c6f30899765
-
SHA1
38b4c2671db34fa23091ba6f684875c9030f81de
-
SHA256
ddb7e7d8995cfff2597f509d08948c000805b165258061e791f1c9584dcdd598
-
SHA512
218f62c71e668c8bb06dfdfdcf33899ca548adf5533a4ab51086907dbf405e9313f7677432419d58a71516705ae0df4144ca9176f7b148a830953b0ca8e4f495
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3