General

  • Target

    Built.exe

  • Size

    6.9MB

  • Sample

    250202-zrct6szpak

  • MD5

    1e646f055b5915993a83581d182dd628

  • SHA1

    f8f1bfc49e31d220082b08e7dc725c097e9fdf11

  • SHA256

    4713e03aeb2f6a2f16fa94e86a26ce3f256a0a7085a241596ef8602b082cfc3e

  • SHA512

    fc36ac085e5c477a02e94e2eae0a20bf0330df36686249b6dc07832a285e95f78298968646234d20d16833414bd8f86096ab03c8ae2843ea374cac43bd4894b8

  • SSDEEP

    98304:DDczHqdVfB2FS2/P2yyuT/9vUIdD9C+z3zO917vOTh+ezDNh7n8mJ1nmOBr9n4mf:DYQst2ybT/9bvLz3S1bA3zpn9VDhhR

Malware Config

Targets

    • Target

      Built.exe

    • Size

      6.9MB

    • MD5

      1e646f055b5915993a83581d182dd628

    • SHA1

      f8f1bfc49e31d220082b08e7dc725c097e9fdf11

    • SHA256

      4713e03aeb2f6a2f16fa94e86a26ce3f256a0a7085a241596ef8602b082cfc3e

    • SHA512

      fc36ac085e5c477a02e94e2eae0a20bf0330df36686249b6dc07832a285e95f78298968646234d20d16833414bd8f86096ab03c8ae2843ea374cac43bd4894b8

    • SSDEEP

      98304:DDczHqdVfB2FS2/P2yyuT/9vUIdD9C+z3zO917vOTh+ezDNh7n8mJ1nmOBr9n4mf:DYQst2ybT/9bvLz3S1bA3zpn9VDhhR

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks