General

  • Target

    Cheat DEEP WEB.rar

  • Size

    6.9MB

  • Sample

    250119-1cc23awrds

  • MD5

    58795e27ded3bfc157e3f3bcbf7d7f72

  • SHA1

    5a4548536338d63cd348e530d1a7642c7472b802

  • SHA256

    0febdcc57349da7a79710b6cf65c7d6c73dfaeaad3ff7bafb73b936a7e222b4a

  • SHA512

    36face98f5ff0b629ea309bd4d8bdc16e3738041a8ab9f1af79f5afd5129c610d2c6e4940c4cb7a5fdfb80dab9a6bf163fc4b734d33348f3f23b1f9618f39cc8

  • SSDEEP

    196608:WRCzI0koatAmNUljyVzLGJUapTocbGDsrAzeEqq79M8iu:nV8tMYGJpM2GIAZl8u

Malware Config

Targets

    • Target

      LaSInject/LaSInject.exe

    • Size

      6.9MB

    • MD5

      b00cc9195c7f6c078ee86baa3275ead3

    • SHA1

      0c5e32dbf11ed61bfdec3ad321f83c8e66224520

    • SHA256

      ed361180fb612d5ae7a8eeab2d8d0a1657bd8bbed655fb43418bbffb080ac13b

    • SHA512

      80327efe6b98253edccf69df53b8ac432c390f3c2b040e117c4c4ba9b13a90adc4c16bbcd2b8333328bd8bc847f1f4f423e241a446bed9b2e006697e11bd81a8

    • SSDEEP

      196608:G1V1vFddB6ylnlPzf+JiJCsmFMvQn6hqgdh0:6FnBRlnlPSa7mmvQpgdh0

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      LaSInject/amboit.dll

    • Size

      619KB

    • MD5

      8e5926c798e62e3862e86d12bc2c09c1

    • SHA1

      4ef4655d38dd9354a70453f7dc363a6e69bb2ab4

    • SHA256

      652f86f48e144bedafb2346f3877d51e249aad3077dcf927602122fb82c30bdc

    • SHA512

      8bd6c40d4182861a1a96e0f443a9b04bf6f78de7c7047f1034fb16488ff7eed8b1072dac4ace3d9969f141dd217d91c3c5f5c8f1cba94846746b79259e9a155a

    • SSDEEP

      12288:ZVq3wZOtZ1oOH9HBFjj1rF6WR9QEKZm+jWodEEVIx:+b9HBFjdF99QEKZm+jWodEEWx

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks