General

  • Target

    TZ CRACKED.exe

  • Size

    6.0MB

  • Sample

    250120-1m1aca1ldx

  • MD5

    f86229e5cd7f5ab81237d1912cc52e8e

  • SHA1

    6661b6d1012bfa1db9f316c41e10efe0b8a172d4

  • SHA256

    b716b22d5f025f9fa601af262869e153faafb19d1122c2baa6d3bc5c436694e9

  • SHA512

    7219ab1ca06831ac47be8bd65fb097173be142806108e9efd44a9ce16fbe623fb883b79a8d944c1bfbedd1e4d68d33c0b7510c201b7f0e79dbcb0d33cbfd4399

  • SSDEEP

    98304:1nEtdFBgwmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R3PMH/j3OeMFXQp:1WFBeN/FJMIDJf0gsAGK4R3kHGFXQTF

Malware Config

Targets

    • Target

      TZ CRACKED.exe

    • Size

      6.0MB

    • MD5

      f86229e5cd7f5ab81237d1912cc52e8e

    • SHA1

      6661b6d1012bfa1db9f316c41e10efe0b8a172d4

    • SHA256

      b716b22d5f025f9fa601af262869e153faafb19d1122c2baa6d3bc5c436694e9

    • SHA512

      7219ab1ca06831ac47be8bd65fb097173be142806108e9efd44a9ce16fbe623fb883b79a8d944c1bfbedd1e4d68d33c0b7510c201b7f0e79dbcb0d33cbfd4399

    • SSDEEP

      98304:1nEtdFBgwmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R3PMH/j3OeMFXQp:1WFBeN/FJMIDJf0gsAGK4R3kHGFXQTF

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks