General

  • Target

    frostware.exe

  • Size

    8.4MB

  • Sample

    250131-2ywxqsyqhv

  • MD5

    14a4d440821bc9816d1302a9fa375b8f

  • SHA1

    c95bbeb39cda8655bd469f36d86851e8c8278c3e

  • SHA256

    9eb68de4f5beeaae937d261cf993a6fd28dfbcf96f21ed8db3eb12ec540b7a11

  • SHA512

    d55281703a42a09d34d8b6719e0c4ddc9a0fd6f4c3a98171a18bc658903ec3f7e36ae7f3b7952e268f50e7ef7b936d7ac489850d70a4c5ab9548b952a3b4e40b

  • SSDEEP

    196608:kdDRkd7wfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWE:+aCIHL7HmBYXrkRoaUNX

Malware Config

Targets

    • Target

      frostware.exe

    • Size

      8.4MB

    • MD5

      14a4d440821bc9816d1302a9fa375b8f

    • SHA1

      c95bbeb39cda8655bd469f36d86851e8c8278c3e

    • SHA256

      9eb68de4f5beeaae937d261cf993a6fd28dfbcf96f21ed8db3eb12ec540b7a11

    • SHA512

      d55281703a42a09d34d8b6719e0c4ddc9a0fd6f4c3a98171a18bc658903ec3f7e36ae7f3b7952e268f50e7ef7b936d7ac489850d70a4c5ab9548b952a3b4e40b

    • SSDEEP

      196608:kdDRkd7wfI9jUCBB7m+mKOY7rXrZu6SELooDmhfvsbnTNWE:+aCIHL7HmBYXrkRoaUNX

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks