General

  • Target

    sss.exe

  • Size

    7.5MB

  • Sample

    250201-s2nk4aylbx

  • MD5

    2f2106091b35aa847436152df5df895d

  • SHA1

    014e3f265d7819bd963ee3b521f20086893922f4

  • SHA256

    4c947d5f08051634ba433e6de571e9a1b7bd53dedcc6c71b6c02368385d6760b

  • SHA512

    a91701e7390a601c0938c9b35a50f027864d3d4cb9f63962cc3b2ff0a861559ac17a4512bafa1575574cc703be8115994918a1941d0fdf946b24ab94f684d336

  • SSDEEP

    196608:qMQCwVnurErvI9pWjgN3ZdahF0pbH1AYtWtQsNo/03WO:WVnurEUWjqeWxi6rbO

Malware Config

Targets

    • Target

      sss.exe

    • Size

      7.5MB

    • MD5

      2f2106091b35aa847436152df5df895d

    • SHA1

      014e3f265d7819bd963ee3b521f20086893922f4

    • SHA256

      4c947d5f08051634ba433e6de571e9a1b7bd53dedcc6c71b6c02368385d6760b

    • SHA512

      a91701e7390a601c0938c9b35a50f027864d3d4cb9f63962cc3b2ff0a861559ac17a4512bafa1575574cc703be8115994918a1941d0fdf946b24ab94f684d336

    • SSDEEP

      196608:qMQCwVnurErvI9pWjgN3ZdahF0pbH1AYtWtQsNo/03WO:WVnurEUWjqeWxi6rbO

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      Ucy(.pyc

    • Size

      1KB

    • MD5

      3288f8e70c0a55058fd34af7077ff415

    • SHA1

      125cf35f2965af9c4a509db5ca7c6f77eec20fe9

    • SHA256

      f3c8781bb444be7c1655fe7e2930674e32de7c3e08c930aa95bb863a26cc30f4

    • SHA512

      6f99d95d8b1facffe22c0a551466368a4569663c9bbd0e3a9200b084dfbb748328c31cc6b30448b67e8ff0679f208b32d7c394050b55b52d4d0fe8ac22f7b2b0

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks