Resubmissions

28-01-2025 20:50

250128-zmpceatqem 10

28-01-2025 19:22

250128-x3kytaynhs 10

General

  • Target

    KingBundler.exe

  • Size

    7.6MB

  • Sample

    250128-x3kytaynhs

  • MD5

    7c25aaf92533982998b057aebb13dd92

  • SHA1

    7174f46079fcf416f544d5dcfe80bac2dc188d17

  • SHA256

    705246c8b120123e106682d54e27e0d08ee3f8869571a52a347dc68deec7abae

  • SHA512

    cffa6f230e27b5544e788f07f8fdf60a479228c643e2520d84b7f157bc9e2781575c91f4efadb559d4a3dcccab2a8c484c754a9cdd44547740c8167fd432e124

  • SSDEEP

    196608:GtD+kd6wfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWx:w5LIHL7HmBYXrYoaUNS

Malware Config

Targets

    • Target

      KingBundler.exe

    • Size

      7.6MB

    • MD5

      7c25aaf92533982998b057aebb13dd92

    • SHA1

      7174f46079fcf416f544d5dcfe80bac2dc188d17

    • SHA256

      705246c8b120123e106682d54e27e0d08ee3f8869571a52a347dc68deec7abae

    • SHA512

      cffa6f230e27b5544e788f07f8fdf60a479228c643e2520d84b7f157bc9e2781575c91f4efadb559d4a3dcccab2a8c484c754a9cdd44547740c8167fd432e124

    • SSDEEP

      196608:GtD+kd6wfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWx:w5LIHL7HmBYXrYoaUNS

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks