General

  • Target

    Built.exe

  • Size

    5.9MB

  • Sample

    250122-ywa1pstjex

  • MD5

    732bd39243a17a3f9171f018efffb376

  • SHA1

    0cbb03427a453203b7fd3994cee583b3aca000b0

  • SHA256

    c58ae92e7e0f601e20255e3827ec2460fe63d940a38665937bc0b8300947b4fc

  • SHA512

    e191ce6fd47c4df376feec2db6bfdd637ca8e6262ef8ecd31566288f522e67649e4968e14b9051ebd15c35abd54d214c1954ebca043d2344e2437942e4795be9

  • SSDEEP

    98304:4KfrAEH3uYDUki65sn6Wfz7pnxCb3AtZC0VZHtKpbzL8SG2XATHsJcskH4nPjZR/:4WrAEXuYDUCDOYbwtZVZibPpG2QrsJca

Malware Config

Targets

    • Target

      Built.exe

    • Size

      5.9MB

    • MD5

      732bd39243a17a3f9171f018efffb376

    • SHA1

      0cbb03427a453203b7fd3994cee583b3aca000b0

    • SHA256

      c58ae92e7e0f601e20255e3827ec2460fe63d940a38665937bc0b8300947b4fc

    • SHA512

      e191ce6fd47c4df376feec2db6bfdd637ca8e6262ef8ecd31566288f522e67649e4968e14b9051ebd15c35abd54d214c1954ebca043d2344e2437942e4795be9

    • SSDEEP

      98304:4KfrAEH3uYDUki65sn6Wfz7pnxCb3AtZC0VZHtKpbzL8SG2XATHsJcskH4nPjZR/:4WrAEXuYDUCDOYbwtZVZibPpG2QrsJca

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks