General

  • Target

    Built.exe

  • Size

    7.6MB

  • Sample

    250204-w4c4xsxqfl

  • MD5

    96f1da4646ebe6c40a0b2c9e2100cb5b

  • SHA1

    011a56a68bc5ed4f6b083f886a29d4569ad1da39

  • SHA256

    0d8200b142665304838ae9abf319db8745294f1be7290014d6427cf282d9e5be

  • SHA512

    820a33a0baeb6c9b7cf7f77f7042edf8b6a87089548e46a6a8471ba5d9aae825288da4fbfb758660141fcdcc2127dbd68f5e8e3e614fb67a4e68894652a768ee

  • SSDEEP

    196608:JQD+kdXAwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWA:a5ZIHL7HmBYXrYoaUNn

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.6MB

    • MD5

      96f1da4646ebe6c40a0b2c9e2100cb5b

    • SHA1

      011a56a68bc5ed4f6b083f886a29d4569ad1da39

    • SHA256

      0d8200b142665304838ae9abf319db8745294f1be7290014d6427cf282d9e5be

    • SHA512

      820a33a0baeb6c9b7cf7f77f7042edf8b6a87089548e46a6a8471ba5d9aae825288da4fbfb758660141fcdcc2127dbd68f5e8e3e614fb67a4e68894652a768ee

    • SSDEEP

      196608:JQD+kdXAwfI9jUCBB7m+mKOY7rXrZusooDmhfvsbnTNWA:a5ZIHL7HmBYXrYoaUNn

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks