General
-
Target
LiSInject.zip
-
Size
8.3MB
-
Sample
250125-vbb6gs1qcy
-
MD5
f0e7f323eec5b9568593a99ee9b908b0
-
SHA1
adadf0292f01a12e476490e5c1dbf3c8770e7d07
-
SHA256
8460c3f694cecc25b73bd5374ee5673cfff5031d002516c14d7d4e3a3d4b7a73
-
SHA512
af23e82fea5d409842d932f2c9b7ba845fdb1569700bf636cac3884604d64fc874b0ba9854817bc6f55daf36df8dad6885c0f0e28fffaba2581cdc1df35fb6d4
-
SSDEEP
196608:OOm1iQVPiySQcwro1LsCSX+dLUpdPwuGgp9QwL51rm6KmNOdRu1udd:O+Iigo3SX4LoCUGY5RXQMo
Behavioral task
behavioral1
Sample
LiSInject.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
LiSInject/LiSInject.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
�y�R$�..pyc
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
LiSInject/amboit.dll
Resource
win11-20241023-en
Malware Config
Targets
-
-
Target
LiSInject.zip
-
Size
8.3MB
-
MD5
f0e7f323eec5b9568593a99ee9b908b0
-
SHA1
adadf0292f01a12e476490e5c1dbf3c8770e7d07
-
SHA256
8460c3f694cecc25b73bd5374ee5673cfff5031d002516c14d7d4e3a3d4b7a73
-
SHA512
af23e82fea5d409842d932f2c9b7ba845fdb1569700bf636cac3884604d64fc874b0ba9854817bc6f55daf36df8dad6885c0f0e28fffaba2581cdc1df35fb6d4
-
SSDEEP
196608:OOm1iQVPiySQcwro1LsCSX+dLUpdPwuGgp9QwL51rm6KmNOdRu1udd:O+Iigo3SX4LoCUGY5RXQMo
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
LiSInject/LiSInject.exe
-
Size
8.3MB
-
MD5
684f8927bb39526b433751ee063e5a7e
-
SHA1
ed9f41d6cb7e8c5c7ef0276b20902c0493bdc1d3
-
SHA256
85f52dadb887bfcf3900d58b4a37c5f5cacabad2adc38db6776c8c75f8c78c97
-
SHA512
500d48685d58a43ed5c4489483600b3a53a02a787d1316ba9cd69d4cec5e234890c7c4b47d26c1d71d89e1d2f21020c14e796f2f41afb3ad4f30229eb2dee37f
-
SSDEEP
196608:cPudJRqZYwfI9jUC2XMvH8zPjweaBpZ0cLXCz9ooccXK7odAxU:tDeIH2XgHq+jqMyR3Yo1
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�y�R$�..pyc
-
Size
1KB
-
MD5
1e9dfc16def543564cd1bf21f7720e06
-
SHA1
1357e05cd0cb329ca269af52ec3d899c3e310e30
-
SHA256
a823acad8acaa344aec7b74c2426cb3bde6f3c89410744431971a966ada1f9e1
-
SHA512
fd4055aa29cf00bbe82f753c6382374377d09f2300ef5d96335943c58e8fa93d6e52ccaf01575787ec1b8d9c7225c1a00bf0ccd976333a4766c057fd1ad43df7
Score1/10 -
-
-
Target
LiSInject/amboit.dll
-
Size
619KB
-
MD5
8e5926c798e62e3862e86d12bc2c09c1
-
SHA1
4ef4655d38dd9354a70453f7dc363a6e69bb2ab4
-
SHA256
652f86f48e144bedafb2346f3877d51e249aad3077dcf927602122fb82c30bdc
-
SHA512
8bd6c40d4182861a1a96e0f443a9b04bf6f78de7c7047f1034fb16488ff7eed8b1072dac4ace3d9969f141dd217d91c3c5f5c8f1cba94846746b79259e9a155a
-
SSDEEP
12288:ZVq3wZOtZ1oOH9HBFjj1rF6WR9QEKZm+jWodEEVIx:+b9HBFjdF99QEKZm+jWodEEWx
Score1/10 -
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3