General

  • Target

    Blank-Grabber-main.rar

  • Size

    8.0MB

  • Sample

    250125-z5jjwaskfr

  • MD5

    4627a2ea3f0da3f3a240427e994702eb

  • SHA1

    78f1ba61315b8e4aafc098d601f71d94f139ecb0

  • SHA256

    ea2595e9863c5fa490406ffb15bc7fc1b8167ffadf452feaa93e82fbb45c1306

  • SHA512

    026e194328bbbb4ed4a23726f7aea8197772a62a1a74e29f6afdf24a4076738d590e8b65e724b4d2df43d70b643ba6c02bb08d91e30b5b2da93cc327785151ac

  • SSDEEP

    196608:JDyKzkYlou2eIepm1HKwIp7pAchKrOE/98G7xf3:cxqGeILowIRpDhyHaG53

Malware Config

Targets

    • Target

      Blank-Grabber-main.rar

    • Size

      8.0MB

    • MD5

      4627a2ea3f0da3f3a240427e994702eb

    • SHA1

      78f1ba61315b8e4aafc098d601f71d94f139ecb0

    • SHA256

      ea2595e9863c5fa490406ffb15bc7fc1b8167ffadf452feaa93e82fbb45c1306

    • SHA512

      026e194328bbbb4ed4a23726f7aea8197772a62a1a74e29f6afdf24a4076738d590e8b65e724b4d2df43d70b643ba6c02bb08d91e30b5b2da93cc327785151ac

    • SSDEEP

      196608:JDyKzkYlou2eIepm1HKwIp7pAchKrOE/98G7xf3:cxqGeILowIRpDhyHaG53

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks