Resubmissions

19-01-2025 10:11

250119-l72atatkbs 10

19-01-2025 10:08

250119-l57d2stjft 10

General

  • Target

    Loader (2).exe

  • Size

    8.1MB

  • Sample

    250119-l72atatkbs

  • MD5

    a936b08bad62e01047e41999ff671141

  • SHA1

    c93cbfda2c9224c4f2afbd2286a39e4c3b79dd26

  • SHA256

    0d2c6263f5f245dfcc4db129de49be8d9837878d2583e03dea97eab7153bd26e

  • SHA512

    aeab492177d0b9fcb96a36b89c595c5ab0c40d22082661d58ca04e7be4e07eee4bbf829f992b3d086f6f4ad45f17f2a7494714c88b47fed6f54ecfbf4ea322b3

  • SSDEEP

    196608:s4Y3hEsOshoKMuIkhVastRL5Di3unSEC1DVNhe:5Y3ysOshouIkPftRL54XL3Nhe

Malware Config

Targets

    • Target

      Loader (2).exe

    • Size

      8.1MB

    • MD5

      a936b08bad62e01047e41999ff671141

    • SHA1

      c93cbfda2c9224c4f2afbd2286a39e4c3b79dd26

    • SHA256

      0d2c6263f5f245dfcc4db129de49be8d9837878d2583e03dea97eab7153bd26e

    • SHA512

      aeab492177d0b9fcb96a36b89c595c5ab0c40d22082661d58ca04e7be4e07eee4bbf829f992b3d086f6f4ad45f17f2a7494714c88b47fed6f54ecfbf4ea322b3

    • SSDEEP

      196608:s4Y3hEsOshoKMuIkhVastRL5Di3unSEC1DVNhe:5Y3ysOshouIkPftRL54XL3Nhe

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks