General
-
Target
Blank-Grabber-main.rar
-
Size
8.0MB
-
Sample
250125-z5jjwaskfr
-
MD5
4627a2ea3f0da3f3a240427e994702eb
-
SHA1
78f1ba61315b8e4aafc098d601f71d94f139ecb0
-
SHA256
ea2595e9863c5fa490406ffb15bc7fc1b8167ffadf452feaa93e82fbb45c1306
-
SHA512
026e194328bbbb4ed4a23726f7aea8197772a62a1a74e29f6afdf24a4076738d590e8b65e724b4d2df43d70b643ba6c02bb08d91e30b5b2da93cc327785151ac
-
SSDEEP
196608:JDyKzkYlou2eIepm1HKwIp7pAchKrOE/98G7xf3:cxqGeILowIRpDhyHaG53
Behavioral task
behavioral1
Sample
Blank-Grabber-main.rar
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Blank-Grabber-main.rar
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Blank-Grabber-main.rar
-
Size
8.0MB
-
MD5
4627a2ea3f0da3f3a240427e994702eb
-
SHA1
78f1ba61315b8e4aafc098d601f71d94f139ecb0
-
SHA256
ea2595e9863c5fa490406ffb15bc7fc1b8167ffadf452feaa93e82fbb45c1306
-
SHA512
026e194328bbbb4ed4a23726f7aea8197772a62a1a74e29f6afdf24a4076738d590e8b65e724b4d2df43d70b643ba6c02bb08d91e30b5b2da93cc327785151ac
-
SSDEEP
196608:JDyKzkYlou2eIepm1HKwIp7pAchKrOE/98G7xf3:cxqGeILowIRpDhyHaG53
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3