General

  • Target

    REEDTWEAKS.exe

  • Size

    8.4MB

  • Sample

    250122-zzvpyswjds

  • MD5

    e34dbb2121d2e532ad6b82a340a2f086

  • SHA1

    6754e1a00290ce82282c7877bbcb970fe52a8efb

  • SHA256

    165e6119d4ee6d158cccb9372e88ad51ea0116e9df1a4698b388d79955828ddd

  • SHA512

    60762bb1cc665b62a7f8a1ee3a080d5f408cdced1432af58b2ab1f17f15ba98388c50a9e156925613c77b699cddd54c4cb124008b553395dbd0dae5fa5edd39c

  • SSDEEP

    196608:vEDRkdQVwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWI:8aCaIHL7HmBYXrkRoaUNn

Malware Config

Targets

    • Target

      REEDTWEAKS.exe

    • Size

      8.4MB

    • MD5

      e34dbb2121d2e532ad6b82a340a2f086

    • SHA1

      6754e1a00290ce82282c7877bbcb970fe52a8efb

    • SHA256

      165e6119d4ee6d158cccb9372e88ad51ea0116e9df1a4698b388d79955828ddd

    • SHA512

      60762bb1cc665b62a7f8a1ee3a080d5f408cdced1432af58b2ab1f17f15ba98388c50a9e156925613c77b699cddd54c4cb124008b553395dbd0dae5fa5edd39c

    • SSDEEP

      196608:vEDRkdQVwfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWI:8aCaIHL7HmBYXrkRoaUNn

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks