General

  • Target

    Built.exe

  • Size

    100.0MB

  • Sample

    250202-zl6v3axqbz

  • MD5

    1634e4d7f8c805ec3ac2b303c0787447

  • SHA1

    de0031098666fb929c19cf8b88f727749d54b8be

  • SHA256

    c389ab210f64f5d85755f64418964169b3b9548a8c422a86b84ea0ac038a2ca7

  • SHA512

    a83f9722eac13abce3462d1c6ecb9e3b222131acd671aa9507ae55f490f10875bef5472ecb0a10881c9d6acfb89927a69cc7a883547352a7b4205c67855d2540

  • SSDEEP

    98304:ge3zHqdVfB2FS2/mIyuT/9vUIdD9C+z3zO917vOTh+ezDNh7n8mJ1nmOBr9n4m9D:goQsIIbT/9bvLz3S1bA3zpn9VDhhb

Malware Config

Targets

    • Target

      Built.exe

    • Size

      100.0MB

    • MD5

      1634e4d7f8c805ec3ac2b303c0787447

    • SHA1

      de0031098666fb929c19cf8b88f727749d54b8be

    • SHA256

      c389ab210f64f5d85755f64418964169b3b9548a8c422a86b84ea0ac038a2ca7

    • SHA512

      a83f9722eac13abce3462d1c6ecb9e3b222131acd671aa9507ae55f490f10875bef5472ecb0a10881c9d6acfb89927a69cc7a883547352a7b4205c67855d2540

    • SSDEEP

      98304:ge3zHqdVfB2FS2/mIyuT/9vUIdD9C+z3zO917vOTh+ezDNh7n8mJ1nmOBr9n4m9D:goQsIIbT/9bvLz3S1bA3zpn9VDhhb

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • Hide Artifacts: Hidden Files and Directories

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks