Resubmissions

05-02-2025 17:47

250205-wc29qsxlat 10

05-02-2025 17:01

250205-vjss7sxpan 10

General

  • Target

    DeltaLoader.exe

  • Size

    44KB

  • Sample

    250205-wc29qsxlat

  • MD5

    50197e452db64d2f815c89ccc3205a29

  • SHA1

    ae614db915c947b4d59ffad9c70f30796746f9b9

  • SHA256

    9d84579a8ef038b25ad305a1109d0b00ae98a4fb23e7de01753697843f779983

  • SHA512

    366ca9fd72578fa78ca87bb5988854d5c0504307cc02cb0169aac089220981f27f52031547a4aa4a1877585802963141e1454ab542a3c7d68531708d8ca54cde

  • SSDEEP

    384:mtSEAIdjiPyK0aq3v3qyMyc0nhjS5Bw5mwMl9eLKLkTQC9LWQyyLnguBih5:KSnIMHjqiecWBCw5NQMekTQ2yqnguy5

Malware Config

Targets

    • Target

      DeltaLoader.exe

    • Size

      44KB

    • MD5

      50197e452db64d2f815c89ccc3205a29

    • SHA1

      ae614db915c947b4d59ffad9c70f30796746f9b9

    • SHA256

      9d84579a8ef038b25ad305a1109d0b00ae98a4fb23e7de01753697843f779983

    • SHA512

      366ca9fd72578fa78ca87bb5988854d5c0504307cc02cb0169aac089220981f27f52031547a4aa4a1877585802963141e1454ab542a3c7d68531708d8ca54cde

    • SSDEEP

      384:mtSEAIdjiPyK0aq3v3qyMyc0nhjS5Bw5mwMl9eLKLkTQC9LWQyyLnguBih5:KSnIMHjqiecWBCw5NQMekTQ2yqnguy5

    • Modifies WinLogon for persistence

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Event Triggered Execution: AppInit DLLs

      Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks