General

  • Target

    Run First.exe

  • Size

    5.8MB

  • Sample

    250128-bmv8yssjgz

  • MD5

    36c4cf5647aa542693b1cc76039d0d92

  • SHA1

    6db822e2a79a4e96b4fe78c53515808bdd040b3f

  • SHA256

    55ffb2cd72353dfa5160e68ffd25630c8ebd2344bf020a38f727a231f1b1ee43

  • SHA512

    94b039764acb80b8aef2dbb7b8a8946c882511807ed2dbd3297b29849f93106f8e6e3f1b3c7844ed20c5cf6b88e8c4a81f08a1828ed2db9ccb6b4b8a14dba7b5

  • SSDEEP

    98304:Jv62T17VIn+ysDT2mCUpJM0I46f//GHqsKPmyoUYVzOPzdqoNMYrPwGRR6ntZkeJ:JCMFVQ+ysDBPI4sWHqVcUzAoNfoGCntd

Malware Config

Targets

    • Target

      Run First.exe

    • Size

      5.8MB

    • MD5

      36c4cf5647aa542693b1cc76039d0d92

    • SHA1

      6db822e2a79a4e96b4fe78c53515808bdd040b3f

    • SHA256

      55ffb2cd72353dfa5160e68ffd25630c8ebd2344bf020a38f727a231f1b1ee43

    • SHA512

      94b039764acb80b8aef2dbb7b8a8946c882511807ed2dbd3297b29849f93106f8e6e3f1b3c7844ed20c5cf6b88e8c4a81f08a1828ed2db9ccb6b4b8a14dba7b5

    • SSDEEP

      98304:Jv62T17VIn+ysDT2mCUpJM0I46f//GHqsKPmyoUYVzOPzdqoNMYrPwGRR6ntZkeJ:JCMFVQ+ysDBPI4sWHqVcUzAoNfoGCntd

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �3���m�.pyc

    • Size

      857B

    • MD5

      e44dcf5b33195325ef697fae9cb3e3ac

    • SHA1

      c223c3ed5d773fa2659a8f4ecee8e59bd0eb84fb

    • SHA256

      e6e7fe7d5b8f0814eea33a95fe2f425bcd829fad40fa749e3b415885d23cf848

    • SHA512

      71fb6fbb934ac7cab020a8ff2cd443c38d9cb1d0ed50d5262e48b93a848ca2c421f8c695f8ef00a1df5ee92cf0b4a0fc726e7330cc96943767ce476db679b373

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks