General

  • Target

    Elemental_Inject.rar

  • Size

    8.3MB

  • Sample

    250131-15k85sykgx

  • MD5

    568e9c88deb9a6dfb0acb696c986bdc8

  • SHA1

    dc6ea4b11fb0b4381a6d1b51006ebdb0094bd44f

  • SHA256

    7b6a446b150e1130c8907729a6f18596905893d719a11c5fd0f28b00f914a250

  • SHA512

    5f2ebc81520c96b818aaed9737c3ac765528b0c7f480e630af6323643488cbb331197c9103c4c247d77cb9cbcb979ddd744b202a1c7992f0665ce691b3d378a9

  • SSDEEP

    196608:Kog1trf+CEaDPsbKhZnv+3pCskZ49UtcDRtOt+fxBJcT:etrmCBDEYnQEsG49KWf86BaT

Malware Config

Targets

    • Target

      Elemental_Inject.exe

    • Size

      8.4MB

    • MD5

      c9cfa4f80f992625276baf3163bb1ef4

    • SHA1

      cb8f6b629e70d266c5313d8d6a18ff48e298f513

    • SHA256

      213800a539b979074818159fc4124c8c9a59b2c5dbce086c1a4732accdd778e8

    • SHA512

      82d5853e9198f9a9e6ec2b7ad9f1d72a0f124771864effac8643649189e0be6d7b6a431309457505027e4490bb8a1ff8c710b6b3fbffbdac543aec8e1cbe5a5c

    • SSDEEP

      196608:cUDHeNkdjbwfI9jUCBB7m+mKOY7rXrZui2ooDmhfvsbnTNWo:fSaRYIHL7HmBYXrtjoaUNL

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks