General

  • Target

    velo.cc.scr

  • Size

    7.6MB

  • Sample

    250119-amr1vszjcv

  • MD5

    842c59151fcf1a3fd423fc16603b05dd

  • SHA1

    5213242f60b0392f1289bbe60ff3cfb1023a3522

  • SHA256

    e06aa94a11cff769d126eb95bc44a3fe2fde762d327dbe1a4bc56e86e6b5d1f7

  • SHA512

    7f26dce33618ad3f6b5c85ed4b2e060af57b2154d2c9323dc107155f17a81b638e170efca22927af697056f02a929202956618434c93de0974f61bc0c564833b

  • SSDEEP

    196608:quD+kdRvwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:354IHL7HmBYXrYoaUNw

Malware Config

Targets

    • Target

      velo.cc.scr

    • Size

      7.6MB

    • MD5

      842c59151fcf1a3fd423fc16603b05dd

    • SHA1

      5213242f60b0392f1289bbe60ff3cfb1023a3522

    • SHA256

      e06aa94a11cff769d126eb95bc44a3fe2fde762d327dbe1a4bc56e86e6b5d1f7

    • SHA512

      7f26dce33618ad3f6b5c85ed4b2e060af57b2154d2c9323dc107155f17a81b638e170efca22927af697056f02a929202956618434c93de0974f61bc0c564833b

    • SSDEEP

      196608:quD+kdRvwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWf:354IHL7HmBYXrYoaUNw

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks