General

  • Target

    Synthwave.exe

  • Size

    8.2MB

  • Sample

    250122-2bfl8szken

  • MD5

    36738fd96f242137cbe95688d06a2436

  • SHA1

    44443c83178a0f9a0c9b4a897eebb259a67c69be

  • SHA256

    6bf320323fe50bbbb2597a78f72a9030e711ddbd10b012fe9a7b6f5b236d4954

  • SHA512

    7554162d9b0dbb463d89e2f359a48e6daf41a3b9d8d83a3e18a04c577256a23789bc25ea3ff8aa9352bab1263bb2a1eb35c17e97f2f271129d26af193d9b463b

  • SSDEEP

    196608:B6gCegwfI9jUC2gYBYv3vbW4SEA+iITm1U6fr:NCwIH2gYBgDWZ+TOzz

Malware Config

Targets

    • Target

      Synthwave.exe

    • Size

      8.2MB

    • MD5

      36738fd96f242137cbe95688d06a2436

    • SHA1

      44443c83178a0f9a0c9b4a897eebb259a67c69be

    • SHA256

      6bf320323fe50bbbb2597a78f72a9030e711ddbd10b012fe9a7b6f5b236d4954

    • SHA512

      7554162d9b0dbb463d89e2f359a48e6daf41a3b9d8d83a3e18a04c577256a23789bc25ea3ff8aa9352bab1263bb2a1eb35c17e97f2f271129d26af193d9b463b

    • SSDEEP

      196608:B6gCegwfI9jUC2gYBYv3vbW4SEA+iITm1U6fr:NCwIH2gYBgDWZ+TOzz

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks