General

  • Target

    Ario Executor.exe

  • Size

    7.6MB

  • Sample

    250124-e2pw9szkcz

  • MD5

    00530ba821d6a8917cd89fa7c1236d15

  • SHA1

    e5e2aca747eac3e9fb4725cc4a768ef1ef88cdee

  • SHA256

    42bea851bc4a2dde756333aebd2afe7e06a07febb222b4efeda6e66eb904b651

  • SHA512

    75b23558b2af7447cc61a6678b010d1445000c739d8ae4fa30d94455473ba830bf0e8cd78d149ff217f503a3f9645614c33afef0bc1e2485f41c5f6bcc794ca7

  • SSDEEP

    196608:XpvD+kdXwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWQ:F5uIHL7HmBYXrYoaUNX

Malware Config

Targets

    • Target

      Ario Executor.exe

    • Size

      7.6MB

    • MD5

      00530ba821d6a8917cd89fa7c1236d15

    • SHA1

      e5e2aca747eac3e9fb4725cc4a768ef1ef88cdee

    • SHA256

      42bea851bc4a2dde756333aebd2afe7e06a07febb222b4efeda6e66eb904b651

    • SHA512

      75b23558b2af7447cc61a6678b010d1445000c739d8ae4fa30d94455473ba830bf0e8cd78d149ff217f503a3f9645614c33afef0bc1e2485f41c5f6bcc794ca7

    • SSDEEP

      196608:XpvD+kdXwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWQ:F5uIHL7HmBYXrYoaUNX

    • Deletes Windows Defender Definitions

      Uses mpcmdrun utility to delete all AV definitions.

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks