General

  • Target

    lawcases_beam_method.exe

  • Size

    7.7MB

  • Sample

    250119-2yr9jszpdl

  • MD5

    16f6b3d05696da918ae0fffcb996fb88

  • SHA1

    390409ec24b5006ac290e312339a28bcd831a75d

  • SHA256

    f1df5a86f428d956cc8fc7cf16cfd479f375450c46ca0e57ff08281614e12b3b

  • SHA512

    d5928d392832ccdbc9d9c26323b3991d3edae8dcfbb551db351eeeb36c31b5e065260117e1462faf26cf6d5496a3ac6ba10be0c8033a80031c31362e93e9cbc5

  • SSDEEP

    196608:pq05eNTfm/pf+xk4dNSESRiU/aQJ8MMgH:Qy/pWu4m5RiUy2tF

Malware Config

Targets

    • Target

      lawcases_beam_method.exe

    • Size

      7.7MB

    • MD5

      16f6b3d05696da918ae0fffcb996fb88

    • SHA1

      390409ec24b5006ac290e312339a28bcd831a75d

    • SHA256

      f1df5a86f428d956cc8fc7cf16cfd479f375450c46ca0e57ff08281614e12b3b

    • SHA512

      d5928d392832ccdbc9d9c26323b3991d3edae8dcfbb551db351eeeb36c31b5e065260117e1462faf26cf6d5496a3ac6ba10be0c8033a80031c31362e93e9cbc5

    • SSDEEP

      196608:pq05eNTfm/pf+xk4dNSESRiU/aQJ8MMgH:Qy/pWu4m5RiUy2tF

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �bf��m�.pyc

    • Size

      1KB

    • MD5

      057019f99f088ff61907855b673b0310

    • SHA1

      0eebaa384fb19a461465b9f9e666653339eb4c38

    • SHA256

      6ab197e64078a9d264c84777092ddadbed4ccf584a0897edbc3b3ae41eb11e37

    • SHA512

      4ded67527035c13a412492429520bbcdba82a230b497e8fefa559f92acea2f68e660b62a03c59a7e03f0a333e99c60fa24e39a3d3afe5cf8ad15fa460e5bd424

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks