General

  • Target

    smaaaxzcolorbot.exe

  • Size

    7.7MB

  • Sample

    250118-271maaynar

  • MD5

    98c5e538f4a9c40e3a1450cbb8136c95

  • SHA1

    55824469ccba8ab3eafe84e7b516b197a1d3699b

  • SHA256

    ba3afd717d843bf0946c20b1763e298d4467bfff8cbad4f8ad1fb6ae8fd06d41

  • SHA512

    558f40e83a1c16fd43790e78d434dfa298a710fe7c25bcf79efc1025c95c1b27372770c82a5fe011dab9370fa03fd69067d82be1c95535d511310a900b5ceb40

  • SSDEEP

    196608:wKD+kdFwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWE:b5AIHL7HmBYXrYoaUNf

Malware Config

Targets

    • Target

      smaaaxzcolorbot.exe

    • Size

      7.7MB

    • MD5

      98c5e538f4a9c40e3a1450cbb8136c95

    • SHA1

      55824469ccba8ab3eafe84e7b516b197a1d3699b

    • SHA256

      ba3afd717d843bf0946c20b1763e298d4467bfff8cbad4f8ad1fb6ae8fd06d41

    • SHA512

      558f40e83a1c16fd43790e78d434dfa298a710fe7c25bcf79efc1025c95c1b27372770c82a5fe011dab9370fa03fd69067d82be1c95535d511310a900b5ceb40

    • SSDEEP

      196608:wKD+kdFwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWE:b5AIHL7HmBYXrYoaUNf

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks