General

  • Target

    Liars.Bar.v0.1.452-OFME.torrent.exe

  • Size

    7.6MB

  • Sample

    250117-je8s3sxnfj

  • MD5

    b85ef1c82c87d8ab23a85ac84e3cc219

  • SHA1

    38429f65121bac1de82bc8fe7660e234c87c1788

  • SHA256

    b0ff5ff5fc78da6436560eee75d109266f11d6d34c8d85f560c759afc06a1569

  • SHA512

    430c99c4ad769a912fa4cc6f66b5b75639d65ca5faf2833db7e6b663e92fa98cf423285ecf910d850b0be8c43f2e1b5fc257d3c536307ecb60aab8a901278d82

  • SSDEEP

    196608:VXD+kdmwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW+:p5LIHL7HmBYXrYoaUNp

Malware Config

Targets

    • Target

      Liars.Bar.v0.1.452-OFME.torrent.exe

    • Size

      7.6MB

    • MD5

      b85ef1c82c87d8ab23a85ac84e3cc219

    • SHA1

      38429f65121bac1de82bc8fe7660e234c87c1788

    • SHA256

      b0ff5ff5fc78da6436560eee75d109266f11d6d34c8d85f560c759afc06a1569

    • SHA512

      430c99c4ad769a912fa4cc6f66b5b75639d65ca5faf2833db7e6b663e92fa98cf423285ecf910d850b0be8c43f2e1b5fc257d3c536307ecb60aab8a901278d82

    • SSDEEP

      196608:VXD+kdmwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW+:p5LIHL7HmBYXrYoaUNp

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks