General

  • Target

    Mcfa-Gen.exe

  • Size

    8.3MB

  • Sample

    250126-kq84naylgp

  • MD5

    8358eb4139312433ae2020fd5f7d926d

  • SHA1

    8ef39b7b09162a782d0651ec0dd843722c7d5233

  • SHA256

    bbe0b6a8d9f46331455849b7ee10a30dc9a7c3247d8491185fa0166699724fc8

  • SHA512

    1e86f0568c91e40e2fd4a71bb70302dcb01a6aa9772b437e2127c452f8d623de83e8e091bc33ae7593b35f16599c91e2561cabfce2bdd4cbf535112500e4b65d

  • SSDEEP

    196608:Cn1dVvwfI9jUCnORird1KfbLOYFSEcN2oc+nBIdAxm:wBkIHOQ76bE1nnBIz

Malware Config

Targets

    • Target

      Mcfa-Gen.exe

    • Size

      8.3MB

    • MD5

      8358eb4139312433ae2020fd5f7d926d

    • SHA1

      8ef39b7b09162a782d0651ec0dd843722c7d5233

    • SHA256

      bbe0b6a8d9f46331455849b7ee10a30dc9a7c3247d8491185fa0166699724fc8

    • SHA512

      1e86f0568c91e40e2fd4a71bb70302dcb01a6aa9772b437e2127c452f8d623de83e8e091bc33ae7593b35f16599c91e2561cabfce2bdd4cbf535112500e4b65d

    • SSDEEP

      196608:Cn1dVvwfI9jUCnORird1KfbLOYFSEcN2oc+nBIdAxm:wBkIHOQ76bE1nnBIz

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks