General

  • Target

    abdi.exe

  • Size

    7.1MB

  • Sample

    250120-tmgdxaxpgs

  • MD5

    40e9e7d9da794c6c14d8359e53a70c52

  • SHA1

    a6a28b0ec1b8a828ffd9e29fab3c336b88efc5b8

  • SHA256

    2d8f268c9a0a66b6116ddb2a2584bff769b468e37b17178b698ab5a04d017841

  • SHA512

    42ef4f998137a48dca0384a6adf1c5d04cf846c824ddb63444395605bd1865f7c7adc2162d9da829c76476b49adb485d56bd0802f0868c7cfa039904589866be

  • SSDEEP

    98304:RDCIfhvpj8mlZMD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+/tMFZA:RGOpjQDfyGgqwBdnpkYRMsc8SFtOoi

Malware Config

Targets

    • Target

      abdi.exe

    • Size

      7.1MB

    • MD5

      40e9e7d9da794c6c14d8359e53a70c52

    • SHA1

      a6a28b0ec1b8a828ffd9e29fab3c336b88efc5b8

    • SHA256

      2d8f268c9a0a66b6116ddb2a2584bff769b468e37b17178b698ab5a04d017841

    • SHA512

      42ef4f998137a48dca0384a6adf1c5d04cf846c824ddb63444395605bd1865f7c7adc2162d9da829c76476b49adb485d56bd0802f0868c7cfa039904589866be

    • SSDEEP

      98304:RDCIfhvpj8mlZMD/x/0feyGgatbQ940BDlgwdnpka9R/k9t+2SzIrzUGt+/tMFZA:RGOpjQDfyGgqwBdnpkYRMsc8SFtOoi

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

MITRE ATT&CK Enterprise v15

Tasks