General

  • Target

    start_bob.7z

  • Size

    6.8MB

  • Sample

    250130-z4sfdsvndj

  • MD5

    7af8c1056a02a92599ec9ba24a85685c

  • SHA1

    41d38d32b76c4b66658f60c7a3a57571e9ca16ba

  • SHA256

    d679d7b9c03d536dbb2a0d83393263b5117fd3a12b545decc1c448c15c3c84f6

  • SHA512

    52333b065d0181467aba89f7ac6d800336e970962284833e57ddeb25414c1a9b9d2371915f00fc8163ca8cc92a43d637e392caaf408d15a1836c723aeb0cf7e3

  • SSDEEP

    98304:5UseBvzTWuShEi2bugftmvH63leSuZMbu2PGd5w8XhZcM4WwQcACI7neKRh/6bJB:OlG6LehiumI5w8cQH7DRhkbJWvcAAP

Malware Config

Targets

    • Target

      start_bob.exe

    • Size

      6.9MB

    • MD5

      8678db7fa75f3e6cbfb071914cb6e186

    • SHA1

      e541ac76ee2dce873ba7ecbb273f1fc173194044

    • SHA256

      c73878de0b280980f5b125fe212c79ef5085d73c56669ca24ea992c5158f8392

    • SHA512

      f429d28afa3abcb7662139e29dd9968f98823721bee1af9afe84ebfa8b16538369f4dc7f8f42c92649a99b44dc78e15a7c68fadd8fa626cedef5daa08641acdf

    • SSDEEP

      98304:R2DjWM8JEE1rZ6amaHl3Ne4i3Tf2PkOpfW9hZMMoVmkzhxIdfXeRaYKJJcGhEIF4:R20peNTfm/pf+xk4dWRatrbWOjgKW

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks