General

  • Target

    IMAGE TOKEN GRABBER.rar

  • Size

    5.8MB

  • Sample

    250118-vntlaszmdn

  • MD5

    0e7cd7916b3a6293ad8cac14785373d6

  • SHA1

    8a48d2b50c0eea8c1ab4f9aa2b1b084edb47ce9b

  • SHA256

    01e9c7b17de6d65c6292e8f86abc5ae3c3150b11504993c426c3b4391688676a

  • SHA512

    be2cb80b0d6dd67010f8edb3b8047ff8fd712dee3b162c5457019c89246c746cd4de0738ec8b3d6dec863b351afefbe26633dca8409396a03555421bbf2da0f4

  • SSDEEP

    98304:Nke70SmD9rst4XC2Zc/FCbPzaMLnn0psA/oe5IkLsL15y0g/3mZTOYR+rBWvVMrY:NkqOD9rstGC2ZuFWPOMjQro8IkALbfkg

Malware Config

Targets

    • Target

      Builder.bat

    • Size

      6.0MB

    • MD5

      6e82d5096ecc9edf1ecf2260b561f957

    • SHA1

      bd9dc15e9f28c4210306ac3a12ad55ed2bf4f939

    • SHA256

      9945e87a1ca542897f02db85a4503a3d5b65de54b08be720d096c62d25e4357d

    • SHA512

      dc155597afa523f128b7e7fecd37b01005e4b32477a4137786f7772b81d06d6330a2214ac0274f7e1acd4f827e0b56ff026df01577299e446dca275d46c60765

    • SSDEEP

      98304:LaEtdFBCm/I5xamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RGOnAKt7M0Cu:LhFIm/NeN/FJMIDJf0gsAGK4RVnAKtIE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks