General

  • Target

    LigmaFEBYPASS1.rar

  • Size

    6.6MB

  • Sample

    250201-2jkadstkgw

  • MD5

    32b26371d5b0b869c3cfcc5f96466c58

  • SHA1

    86ae81e21c1317538892610b1411c314675a1eef

  • SHA256

    03f914dae6fc3707705ca9e51ffdfb5b62aa10dd687aa164eca59af4f5d4e7fb

  • SHA512

    c4e2cc7f41900e85441587081bf5ee0dcb5559534341670ca768d158303f5c4e69de0dd3aef1c55c17131f96079b69673b6783e843e375b0974e17d26bc77f66

  • SSDEEP

    196608:Ljoww5ajddN6S5Xc8OwyYyvYdaJhM4zkbIO:vZddAmc8OwjUM4g8O

Malware Config

Targets

    • Target

      LigmaFEBYPASS.txt

    • Size

      6.7MB

    • MD5

      94a15cac05cf17973af24fdff7085f1a

    • SHA1

      8a5ed7c1ffb26e60099af67e812b4f4bf92715f5

    • SHA256

      fa8a0e24d531b7f4dcdeb5e9c32c5aae5e3bc2db4ddb19da38eb3bfb21c01a7e

    • SHA512

      e267e462a1767d09e02dd066c9b5a13d23090e0ffdba027466ff47d1a855e0cc7de7472a81c7dca32021c79c66ff9807f850475b465480729b3b946a29f572e1

    • SSDEEP

      196608:2qFMeN/FJMIDJf0gsAGK5SEQR8kxhLYae:P/Fqyf0gsfN8kzM9

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks