General

  • Target

    Delta Executor.exe

  • Size

    6.9MB

  • Sample

    250123-k3fymstrek

  • MD5

    b9a154faf6ea395cebef559c2704a45a

  • SHA1

    9c30954379be499e8d2750d5f0fc7d1d3b4f58ba

  • SHA256

    90db7abf08b6c82de3077609faa7f456e41cde437f4c1bc610898a86e95e4b0a

  • SHA512

    fd65ec5498931e04da340eac8d8c4ee6b260e45e44abc5c04e5dd598d333b0c7c2f4165be019ba2261041daefa86e8f7be5dd37673d71ab05f8caf604da907b7

  • SSDEEP

    98304:8cDjWM8JEE1FZG9amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIG:8c0TXeNTfm/pf+xk4dWRimrbW3jmyT

Malware Config

Targets

    • Target

      Delta Executor.exe

    • Size

      6.9MB

    • MD5

      b9a154faf6ea395cebef559c2704a45a

    • SHA1

      9c30954379be499e8d2750d5f0fc7d1d3b4f58ba

    • SHA256

      90db7abf08b6c82de3077609faa7f456e41cde437f4c1bc610898a86e95e4b0a

    • SHA512

      fd65ec5498931e04da340eac8d8c4ee6b260e45e44abc5c04e5dd598d333b0c7c2f4165be019ba2261041daefa86e8f7be5dd37673d71ab05f8caf604da907b7

    • SSDEEP

      98304:8cDjWM8JEE1FZG9amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRiYRJJcGhEIG:8c0TXeNTfm/pf+xk4dWRimrbW3jmyT

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks