General
-
Target
perish266.exe
-
Size
7.7MB
-
Sample
250126-lxskxsylas
-
MD5
5fa3ecc4c8fa26dd662625a2377a8585
-
SHA1
cbbb3e15cb3a4fb05d2d85fc97e924e6a7476716
-
SHA256
9f20e64f24f51f53eb9514dae0ac2fd67668a1fd3dd23723a495c45aac547cf4
-
SHA512
0d2253f3affcb91bc6e6532cb64e7622ba2c3e636c7e24b717deaef4ccb03af25486a274931d60d34f3ca70162ea08beca4f648d072ae265c38209ce375516c9
-
SSDEEP
196608:WbD+kdWwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWq:65DIHL7HmBYXrYoaUNF
Behavioral task
behavioral1
Sample
perish266.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
perish266.exe
-
Size
7.7MB
-
MD5
5fa3ecc4c8fa26dd662625a2377a8585
-
SHA1
cbbb3e15cb3a4fb05d2d85fc97e924e6a7476716
-
SHA256
9f20e64f24f51f53eb9514dae0ac2fd67668a1fd3dd23723a495c45aac547cf4
-
SHA512
0d2253f3affcb91bc6e6532cb64e7622ba2c3e636c7e24b717deaef4ccb03af25486a274931d60d34f3ca70162ea08beca4f648d072ae265c38209ce375516c9
-
SSDEEP
196608:WbD+kdWwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWq:65DIHL7HmBYXrYoaUNF
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3