Resubmissions

22-01-2025 11:44

250122-nwnaxsvlaw 10

General

  • Target

    Netflix_Accounts_Generator_v1.3.exe

  • Size

    241.0MB

  • Sample

    250122-nwnaxsvlaw

  • MD5

    620a3065e5e601533c0e0eeefb6bbcb8

  • SHA1

    02b6ee5ff1c425d477243a8fb14ed4213d603ebe

  • SHA256

    d164f45fc81b37c4782dd50fef5f60949cdbf5234d6196e91fb694acb706c872

  • SHA512

    2adcab6b11d75959b1f8f7b9131462f4e4315b655951bb5fcb1b0a75026e20f9a86bb0a993018de6e373c8722451dc02dd67a2b054b30f66dabfe0aea0d04cf9

  • SSDEEP

    98304:nRfEtdFBGdamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RcOuAK1Rv/XE:ncFE4eN/FJMIDJf0gsAGK4RPuAK1pXE

Malware Config

Targets

    • Target

      Netflix_Accounts_Generator_v1.3.exe

    • Size

      241.0MB

    • MD5

      620a3065e5e601533c0e0eeefb6bbcb8

    • SHA1

      02b6ee5ff1c425d477243a8fb14ed4213d603ebe

    • SHA256

      d164f45fc81b37c4782dd50fef5f60949cdbf5234d6196e91fb694acb706c872

    • SHA512

      2adcab6b11d75959b1f8f7b9131462f4e4315b655951bb5fcb1b0a75026e20f9a86bb0a993018de6e373c8722451dc02dd67a2b054b30f66dabfe0aea0d04cf9

    • SSDEEP

      98304:nRfEtdFBGdamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4RcOuAK1Rv/XE:ncFE4eN/FJMIDJf0gsAGK4RPuAK1pXE

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Password Policy Discovery

      Attempt to access detailed information about the password policy used within an enterprise network.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �t�(4jQ.pyc

    • Size

      857B

    • MD5

      fc3f107688175a5ff734b72577897631

    • SHA1

      69690396de33a969949fa5924607cf94cbaa4bd4

    • SHA256

      e5848129827127753b2dfe68ebdb71a2a06adebba5a7beb22497004cd451b71f

    • SHA512

      4f00fb85f7f376075958d4ff4f22531ce5a43935699b9741605586ad3d9f13fc9ae00a00e44979dd0203ec0e805c7921b772414c924d2ca9f7a158bc064b0db7

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks