General
-
Target
KingBundler.exe
-
Size
7.6MB
-
Sample
250128-x3kytaynhs
-
MD5
7c25aaf92533982998b057aebb13dd92
-
SHA1
7174f46079fcf416f544d5dcfe80bac2dc188d17
-
SHA256
705246c8b120123e106682d54e27e0d08ee3f8869571a52a347dc68deec7abae
-
SHA512
cffa6f230e27b5544e788f07f8fdf60a479228c643e2520d84b7f157bc9e2781575c91f4efadb559d4a3dcccab2a8c484c754a9cdd44547740c8167fd432e124
-
SSDEEP
196608:GtD+kd6wfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWx:w5LIHL7HmBYXrYoaUNS
Behavioral task
behavioral1
Sample
KingBundler.exe
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
KingBundler.exe
-
Size
7.6MB
-
MD5
7c25aaf92533982998b057aebb13dd92
-
SHA1
7174f46079fcf416f544d5dcfe80bac2dc188d17
-
SHA256
705246c8b120123e106682d54e27e0d08ee3f8869571a52a347dc68deec7abae
-
SHA512
cffa6f230e27b5544e788f07f8fdf60a479228c643e2520d84b7f157bc9e2781575c91f4efadb559d4a3dcccab2a8c484c754a9cdd44547740c8167fd432e124
-
SSDEEP
196608:GtD+kd6wfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWx:w5LIHL7HmBYXrYoaUNS
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3