Resubmissions

20-01-2025 23:43

250120-3qtyvavqdx 10

20-01-2025 23:27

250120-3fxa8avlgt 10

20-01-2025 23:26

250120-3ethyavlaj 10

General

  • Target

    Senex Free ReBorn.exe

  • Size

    6.9MB

  • Sample

    250120-3fxa8avlgt

  • MD5

    03559a96ddc80dfc0fd3a933fff9f884

  • SHA1

    b630501a95be2e1027a0839a65625eca8eefb929

  • SHA256

    43317a28af628e970450d3c95fbaa991b37a1c5ae73e0857d6187040a5c3c971

  • SHA512

    35ebc222a2ed9883698093e88123ec3a46734ddb1640c1588dbce7953b382e41d183c6b9d24b44de915df6f5f406f69a31bcf73fa347311d50b5e3501713d4f9

  • SSDEEP

    98304:WEDjWM8JEE1F3iDamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIJ:WE0NveNTfm/pf+xk4dWRimrbW3jmyE

Malware Config

Targets

    • Target

      Senex Free ReBorn.exe

    • Size

      6.9MB

    • MD5

      03559a96ddc80dfc0fd3a933fff9f884

    • SHA1

      b630501a95be2e1027a0839a65625eca8eefb929

    • SHA256

      43317a28af628e970450d3c95fbaa991b37a1c5ae73e0857d6187040a5c3c971

    • SHA512

      35ebc222a2ed9883698093e88123ec3a46734ddb1640c1588dbce7953b382e41d183c6b9d24b44de915df6f5f406f69a31bcf73fa347311d50b5e3501713d4f9

    • SSDEEP

      98304:WEDjWM8JEE1F3iDamaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIJ:WE0NveNTfm/pf+xk4dWRimrbW3jmyE

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks