General

  • Target

    Loader.exe

  • Size

    7.0MB

  • Sample

    250117-zl5m1atkap

  • MD5

    0a2d7084722af48014d2d3c57d82a4cf

  • SHA1

    a0d9b13c5322e7c51824d97878526a4661c1f9b9

  • SHA256

    62da5c7656bd7e3b8ce3d57fd321cde02a484638793f69a1e72ec61a4b0463cc

  • SHA512

    a88e2cf7e3254e5aa0f205fbc0a4c00eeadf2ff1415bd5a7476e9ec3f79a31bdc261915165e8250849e70e0fef7ad0c195f09375dd1092376e63dd39e3b4dbbe

  • SSDEEP

    98304:4FDjWM8JEE1FE6amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIF5:4F0ceNTfm/pf+xk4dWRimrbW3jmyW

Malware Config

Targets

    • Target

      Loader.exe

    • Size

      7.0MB

    • MD5

      0a2d7084722af48014d2d3c57d82a4cf

    • SHA1

      a0d9b13c5322e7c51824d97878526a4661c1f9b9

    • SHA256

      62da5c7656bd7e3b8ce3d57fd321cde02a484638793f69a1e72ec61a4b0463cc

    • SHA512

      a88e2cf7e3254e5aa0f205fbc0a4c00eeadf2ff1415bd5a7476e9ec3f79a31bdc261915165e8250849e70e0fef7ad0c195f09375dd1092376e63dd39e3b4dbbe

    • SSDEEP

      98304:4FDjWM8JEE1FE6amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIF5:4F0ceNTfm/pf+xk4dWRimrbW3jmyW

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks