General
-
Target
bo6 external.exe
-
Size
8.4MB
-
Sample
250120-z8ckqszmgx
-
MD5
e0dbf609d451588fefc34e8e07292e7f
-
SHA1
e9ddc74353b61212cd0a9b44c18d28d03c8e53eb
-
SHA256
4e34e087795a71e038075c3ed42851bd08cd4f3ecf73499c2312acc2c570bd50
-
SHA512
cdede75aaedf24962c8f5f81551dea9029aed15402b940f90d6ba166fe9912b43f5bdd1644ae71caf9d86c3174e1f181e00db77babfa1cfe6863f6171cdd2822
-
SSDEEP
196608:C6DRkdguwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNW:FaOFIHL7HmBYXrkRoaUN
Behavioral task
behavioral1
Sample
bo6 external.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bo6 external.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�R��D�.pyc
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
�R��D�.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
bo6 external.exe
-
Size
8.4MB
-
MD5
e0dbf609d451588fefc34e8e07292e7f
-
SHA1
e9ddc74353b61212cd0a9b44c18d28d03c8e53eb
-
SHA256
4e34e087795a71e038075c3ed42851bd08cd4f3ecf73499c2312acc2c570bd50
-
SHA512
cdede75aaedf24962c8f5f81551dea9029aed15402b940f90d6ba166fe9912b43f5bdd1644ae71caf9d86c3174e1f181e00db77babfa1cfe6863f6171cdd2822
-
SSDEEP
196608:C6DRkdguwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNW:FaOFIHL7HmBYXrkRoaUN
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
�R��D�.pyc
-
Size
1KB
-
MD5
288966ebffc85ba7a8d94bbfa7a4454e
-
SHA1
8964216ac79b584e0f01c856ca78c478fe03b763
-
SHA256
5dd9e67ca687d7ddf82c0a964c76fd78361df0430db02971386e19ca02ee6b6a
-
SHA512
090ea74b5b0a6c3730e900e061669a4cc6dcf4a13097110eff06c6168a7399506c8b79dada114b800a5550e6fd773f2ff025edaca7581b5577934e3d355eaabd
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3