General

  • Target

    IslandDupeAppwithexecutor.exe

  • Size

    6.0MB

  • Sample

    250131-f33eesymc1

  • MD5

    92c78207eb95da0b3202d144be1bd51c

  • SHA1

    4bd9478d59a886ed031da8b483445ef386873109

  • SHA256

    3d3ee61c8ac3b08ae5fa3bd9df4fa703c99f782f524cbb4fd602d5496069a8d9

  • SHA512

    13329568971cc3e1d5251900a753e1a44f08709dcde68e4e9210e7268f9503a431bf4e5f9feee0d655e382d9a968417703449a5e3e5f8446c8eea2c9df5da0aa

  • SSDEEP

    98304:/uEtdFBgwsvamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R8PM2yb3cMIKY5:/tFmyeN/FJMIDJf0gsAGK4R8k2oIKY5

Malware Config

Targets

    • Target

      IslandDupeAppwithexecutor.exe

    • Size

      6.0MB

    • MD5

      92c78207eb95da0b3202d144be1bd51c

    • SHA1

      4bd9478d59a886ed031da8b483445ef386873109

    • SHA256

      3d3ee61c8ac3b08ae5fa3bd9df4fa703c99f782f524cbb4fd602d5496069a8d9

    • SHA512

      13329568971cc3e1d5251900a753e1a44f08709dcde68e4e9210e7268f9503a431bf4e5f9feee0d655e382d9a968417703449a5e3e5f8446c8eea2c9df5da0aa

    • SSDEEP

      98304:/uEtdFBgwsvamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzQgsRuGK4R8PM2yb3cMIKY5:/tFmyeN/FJMIDJf0gsAGK4R8k2oIKY5

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks