General

  • Target

    loader.exe

  • Size

    7.4MB

  • Sample

    250126-b61msayrak

  • MD5

    f3e89323904b96d35302e0c76975a569

  • SHA1

    10e539fc53fb8546c5dc7c3b3d2b85961d000794

  • SHA256

    50d8427c67ae093e01fd83ed3c3d5af142241ad1fa775066b6159106d89ba28d

  • SHA512

    7c7b4964967f2b0cdcb2ea8fc1b3a5dc6f3e3e7b3795ed46f953345fa2c1f80f7962156a2ff44501b2b06c7c0c386ca3e0297141b4778d2fb931003914d5ef0e

  • SSDEEP

    98304:e6Si8TR7urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EBKhOh112mJ5T:e9burErvI9pWjgfPvzm6gsFE44fr9

Malware Config

Targets

    • Target

      loader.exe

    • Size

      7.4MB

    • MD5

      f3e89323904b96d35302e0c76975a569

    • SHA1

      10e539fc53fb8546c5dc7c3b3d2b85961d000794

    • SHA256

      50d8427c67ae093e01fd83ed3c3d5af142241ad1fa775066b6159106d89ba28d

    • SHA512

      7c7b4964967f2b0cdcb2ea8fc1b3a5dc6f3e3e7b3795ed46f953345fa2c1f80f7962156a2ff44501b2b06c7c0c386ca3e0297141b4778d2fb931003914d5ef0e

    • SSDEEP

      98304:e6Si8TR7urErvz81LpWjjUa50ZtPvYRt2e4GFNGjfzfbIbApJo4EBKhOh112mJ5T:e9burErvI9pWjgfPvzm6gsFE44fr9

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks