General

  • Target

    Komar Klient.zip

  • Size

    7.5MB

  • Sample

    250204-rhx5razmhr

  • MD5

    06340df3a3b8ea10ac1077f3992b0695

  • SHA1

    b9c883f4c249cc105f313e30543c2df9335fc12f

  • SHA256

    c3a4ffb91093fb7a4cbee9c17eacfb9072bbdba34fe3283c2c0b43ed2be4cd4f

  • SHA512

    ab73fbe03731cfb927b89a02fca8603314138a9d71e0ca388f681bc86fff27bbae046e71f611a522f159c665840f3aba5bfe81781ccee0a62b097e85cc128fe7

  • SSDEEP

    196608:SjGEmnwleZz9mz75CqASmyZ5hj36k+It8B7p7vZrX9ut:Sx5ee35zAHy5joIi59K

Malware Config

Targets

    • Target

      Komar Klient.exe

    • Size

      7.6MB

    • MD5

      cdbea09d44ac7a498a28f33ad5157992

    • SHA1

      ff0392a61305fb914d652dbdbdb4a8b8553901bb

    • SHA256

      c7b501cef8a4540c5d4f43f8fb51086abe80dd56f200dfda48993c80bfdc913b

    • SHA512

      f2bf21aa201c757f4e4b4daa2cc9f024fa409075678558ba76c4bc45b2da0044ff8422447d7920eb66cdddae4a9b91ebf408b154401093af80f67815d9eff94b

    • SSDEEP

      196608:w6D+kdBwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWD:35wIHL7HmBYXrYoaUNY

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks