Resubmissions

01-02-2025 17:19

250201-vv6jfaskhs 10

01-02-2025 17:18

250201-vvpwpatqhn 10

General

  • Target

    Komar Client.exe

  • Size

    7.6MB

  • Sample

    250201-vvpwpatqhn

  • MD5

    777016b76fe96ee46aa60c70086760cc

  • SHA1

    258707ce944fbe294051acb08f6137e96a584e36

  • SHA256

    6b1c0d64164ae8a638ab185b45f5f5f602ed51e7c58671c168e40b41d99b8cc3

  • SHA512

    db5a8b10b4892859b8f74ba369c7f29e5cb0dbf64d05dc1fd44db8811b38a4ab581379e19e8e2b09877ccc41b29e1618235a06220d35f2676b7d1807b257860f

  • SSDEEP

    196608:iCD+kdjjHwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW/:d5lMIHL7HmBYXrYoaUN4

Malware Config

Targets

    • Target

      Komar Client.exe

    • Size

      7.6MB

    • MD5

      777016b76fe96ee46aa60c70086760cc

    • SHA1

      258707ce944fbe294051acb08f6137e96a584e36

    • SHA256

      6b1c0d64164ae8a638ab185b45f5f5f602ed51e7c58671c168e40b41d99b8cc3

    • SHA512

      db5a8b10b4892859b8f74ba369c7f29e5cb0dbf64d05dc1fd44db8811b38a4ab581379e19e8e2b09877ccc41b29e1618235a06220d35f2676b7d1807b257860f

    • SSDEEP

      196608:iCD+kdjjHwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNW/:d5lMIHL7HmBYXrYoaUN4

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      >���d$.pyc

    • Size

      1KB

    • MD5

      724d79eb70573cc127f6b9fa85beef96

    • SHA1

      e813e0d03d76c51aa18903eb42df2e63110a0c71

    • SHA256

      99142e6ce63206e2ffa918684cd621e727a1c7f91c10148b5199a5569770674d

    • SHA512

      01899b6ed320af22a4eb37a7f01369bbbeb042c19c19dc939b6b34955164b7206b8c4f0ef6424d1b2cf6ce5c52009985487f11900e8030922bd7192357d51c58

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks