General
-
Target
Run First.exe
-
Size
5.8MB
-
Sample
250128-bmv8yssjgz
-
MD5
36c4cf5647aa542693b1cc76039d0d92
-
SHA1
6db822e2a79a4e96b4fe78c53515808bdd040b3f
-
SHA256
55ffb2cd72353dfa5160e68ffd25630c8ebd2344bf020a38f727a231f1b1ee43
-
SHA512
94b039764acb80b8aef2dbb7b8a8946c882511807ed2dbd3297b29849f93106f8e6e3f1b3c7844ed20c5cf6b88e8c4a81f08a1828ed2db9ccb6b4b8a14dba7b5
-
SSDEEP
98304:Jv62T17VIn+ysDT2mCUpJM0I46f//GHqsKPmyoUYVzOPzdqoNMYrPwGRR6ntZkeJ:JCMFVQ+ysDBPI4sWHqVcUzAoNfoGCntd
Behavioral task
behavioral1
Sample
Run First.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
�3���m�.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Run First.exe
-
Size
5.8MB
-
MD5
36c4cf5647aa542693b1cc76039d0d92
-
SHA1
6db822e2a79a4e96b4fe78c53515808bdd040b3f
-
SHA256
55ffb2cd72353dfa5160e68ffd25630c8ebd2344bf020a38f727a231f1b1ee43
-
SHA512
94b039764acb80b8aef2dbb7b8a8946c882511807ed2dbd3297b29849f93106f8e6e3f1b3c7844ed20c5cf6b88e8c4a81f08a1828ed2db9ccb6b4b8a14dba7b5
-
SSDEEP
98304:Jv62T17VIn+ysDT2mCUpJM0I46f//GHqsKPmyoUYVzOPzdqoNMYrPwGRR6ntZkeJ:JCMFVQ+ysDBPI4sWHqVcUzAoNfoGCntd
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�3���m�.pyc
-
Size
857B
-
MD5
e44dcf5b33195325ef697fae9cb3e3ac
-
SHA1
c223c3ed5d773fa2659a8f4ecee8e59bd0eb84fb
-
SHA256
e6e7fe7d5b8f0814eea33a95fe2f425bcd829fad40fa749e3b415885d23cf848
-
SHA512
71fb6fbb934ac7cab020a8ff2cd443c38d9cb1d0ed50d5262e48b93a848ca2c421f8c695f8ef00a1df5ee92cf0b4a0fc726e7330cc96943767ce476db679b373
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3