General

  • Target

    A&D-TOOL-V7.exe

  • Size

    8.9MB

  • Sample

    250121-v2x6msvkgz

  • MD5

    24ccf0db7f88fc65ed4a4cce3a7b15ce

  • SHA1

    d9cdb33d1815ffd3fd3030c2e0f42cece09507cc

  • SHA256

    a2206d68d2939f7238e6e41a685fcbcd41d43366f757661a2c8d054b658d92c5

  • SHA512

    d9dbf580a49a972d4c333e6351709a45f13c5575b7a9b30d6bb15f243590b36b2633f6ed21e2ad5eaacb1b9d3bf97d887c31a5a841e528a93dd0f39c1d3b0d7c

  • SSDEEP

    196608:h6oMO0QlY0wfI9jUCzi4H1qSiXLGVi7DMgpZ1eWaFQ9VMwICEc/X4:9r0QaIHziK1piXLGVE4U/N9VJg

Malware Config

Targets

    • Target

      A&D-TOOL-V7.exe

    • Size

      8.9MB

    • MD5

      24ccf0db7f88fc65ed4a4cce3a7b15ce

    • SHA1

      d9cdb33d1815ffd3fd3030c2e0f42cece09507cc

    • SHA256

      a2206d68d2939f7238e6e41a685fcbcd41d43366f757661a2c8d054b658d92c5

    • SHA512

      d9dbf580a49a972d4c333e6351709a45f13c5575b7a9b30d6bb15f243590b36b2633f6ed21e2ad5eaacb1b9d3bf97d887c31a5a841e528a93dd0f39c1d3b0d7c

    • SSDEEP

      196608:h6oMO0QlY0wfI9jUCzi4H1qSiXLGVi7DMgpZ1eWaFQ9VMwICEc/X4:9r0QaIHziK1piXLGVE4U/N9VJg

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks