General

  • Target

    documento.tt

  • Size

    6.7MB

  • Sample

    250201-1tpgestpek

  • MD5

    a7d9e8672aa8c0a692c072efa65260ca

  • SHA1

    0b760605ca99cfc0703be14092f75b7575ea6952

  • SHA256

    05d21266518f990a7b77c21619c49e3fa441632aaff1bc665897c5b31c20763a

  • SHA512

    3d547d21be719a1b77cfc3900121d78638a0d1becf7fcf9ed847224275ea6bcee5879d4b7bd6435b21e6c9ac2a277dfa38c2009620c058428b0bea09ac7aaf2e

  • SSDEEP

    196608:8YFWeN/FJMIDJf0gsAGK5SEQROkaEWWlGE:3/Fqyf0gsfNOkhfb

Malware Config

Targets

    • Target

      documento.tt

    • Size

      6.7MB

    • MD5

      a7d9e8672aa8c0a692c072efa65260ca

    • SHA1

      0b760605ca99cfc0703be14092f75b7575ea6952

    • SHA256

      05d21266518f990a7b77c21619c49e3fa441632aaff1bc665897c5b31c20763a

    • SHA512

      3d547d21be719a1b77cfc3900121d78638a0d1becf7fcf9ed847224275ea6bcee5879d4b7bd6435b21e6c9ac2a277dfa38c2009620c058428b0bea09ac7aaf2e

    • SSDEEP

      196608:8YFWeN/FJMIDJf0gsAGK5SEQROkaEWWlGE:3/Fqyf0gsfNOkhfb

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks