General

  • Target

    Void Nuker V2.exe

  • Size

    7.5MB

  • Sample

    250131-amwdaawpaz

  • MD5

    22c33426ed8eb813414931f104e169a2

  • SHA1

    21a47d7509306242c6aa9601ce1ffe9d1f0b0a5b

  • SHA256

    1192285bc29610ccc1b456566a30829cf201ec9291c80376fc3f12ef29b2f3da

  • SHA512

    cb1826f5a1c190d07626205f40ca7d78f9596a0a90a99410c83f2d61d1f41da8822de1bbc95e77c5c1b74140c5994c2bb7eb0ff49ce363bc46283b77f8408fca

  • SSDEEP

    196608:Hi1d5vRwfI9jUCnORird1KfbLOYgN2oc+nBIdAx6:C12IHOQ76bynnBIr

Malware Config

Targets

    • Target

      Void Nuker V2.exe

    • Size

      7.5MB

    • MD5

      22c33426ed8eb813414931f104e169a2

    • SHA1

      21a47d7509306242c6aa9601ce1ffe9d1f0b0a5b

    • SHA256

      1192285bc29610ccc1b456566a30829cf201ec9291c80376fc3f12ef29b2f3da

    • SHA512

      cb1826f5a1c190d07626205f40ca7d78f9596a0a90a99410c83f2d61d1f41da8822de1bbc95e77c5c1b74140c5994c2bb7eb0ff49ce363bc46283b77f8408fca

    • SSDEEP

      196608:Hi1d5vRwfI9jUCnORird1KfbLOYgN2oc+nBIdAx6:C12IHOQ76bynnBIr

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �gp��n�.pyc

    • Size

      1KB

    • MD5

      7da7c017ddcb7ed0530d471e14dfe880

    • SHA1

      fea86c3fda4f0680a3cc984ec9082dbf72069529

    • SHA256

      3682cd715097ed855091429fcaf77e7a9f5432e9e6d5d8999257309242ed190a

    • SHA512

      21a3264d3714e7e13054a3dda52eb02566f93f18522334bd480d11d80e98878353428704eda94f1ce25804bc3aa1288d9d220f821962ff7b9f22093359815de6

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks