General
-
Target
MCFA_GEN.exe
-
Size
20.0MB
-
Sample
250131-q9zl8azkal
-
MD5
3d7e499f913cb6169a9c3e3a4c58c503
-
SHA1
bebb77737cad933bf4ad368b9e91364138e49794
-
SHA256
220cace5eb1cfa3cc679e0e39d6028396b1b74534086866bbc1a72d3672ff51e
-
SHA512
f98d8a2e95c6b71e49d069f180848a7b90e15de633f8193c8cff6ac911058890197e90930e4792c45ce6f1a561b28bdd669a3d24c232f65a86d416baf17a7169
-
SSDEEP
196608:qI1dwwfI9jUCnORird1KfbLOYFSEcN2oc+nBIdAxP:HTIHOQ76bE1nnBIu
Behavioral task
behavioral1
Sample
MCFA_GEN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
MCFA_GEN.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral3
Sample
ݭ�?��.pyc
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
ݭ�?��.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
MCFA_GEN.exe
-
Size
20.0MB
-
MD5
3d7e499f913cb6169a9c3e3a4c58c503
-
SHA1
bebb77737cad933bf4ad368b9e91364138e49794
-
SHA256
220cace5eb1cfa3cc679e0e39d6028396b1b74534086866bbc1a72d3672ff51e
-
SHA512
f98d8a2e95c6b71e49d069f180848a7b90e15de633f8193c8cff6ac911058890197e90930e4792c45ce6f1a561b28bdd669a3d24c232f65a86d416baf17a7169
-
SSDEEP
196608:qI1dwwfI9jUCnORird1KfbLOYFSEcN2oc+nBIdAxP:HTIHOQ76bE1nnBIu
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
Hide Artifacts: Hidden Files and Directories
-
-
-
Target
ݭ�?��.pyc
-
Size
1KB
-
MD5
ce68ce884331734cddc99e5a5a322675
-
SHA1
2ae2c0daa7988ad6d339122547be3b3c463e847e
-
SHA256
c55d7a9429da223de91f9f4ee92e4cbd145a480e33a686ab99f7459682afa27c
-
SHA512
b46614ff33d593ea82d30949b19816dcecdb101f51e41e15b97096ad6145ec001d5d61544fb9185c77a8673d476f18f0093bea5a84436b85f702c94ef2add6b2
Score1/10 -
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3