General
-
Target
FunTime.zip
-
Size
7.5MB
-
Sample
250208-a2jb9swmdw
-
MD5
b7511307754d58daffd30177fe37ac76
-
SHA1
f3b6bc9b85c26c61c71c41246a6ea53b011a3687
-
SHA256
429f9b84b71f65702359b2dac0a962322862e7c0c33e00685100c0699ba4197b
-
SHA512
0324c3e72b96b7873b9470ad88048cf5a4f78e47213b3e487368c2565a54a12af5b7a120813fcaf04866137a7e4f16519c63443db6f1c58183b708fda30fd6e0
-
SSDEEP
196608:795g5lAQWr9VHp83GvCO1XiGh2FEZ50u9rqc:A5l/Wr9V+CH1XPh2O39rX
Behavioral task
behavioral1
Sample
HackByINC.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
HackByINC.exe
Resource
win10v2004-20250207-en
Malware Config
Targets
-
-
Target
HackByINC.exe
-
Size
6.8MB
-
MD5
6ca3af9f2b35018656c3e3c50fed4d5b
-
SHA1
db76da5f8cfee5c4ad613d238231968608f4576e
-
SHA256
1f36c3cb1c8b3cf49b38b47ca5f51c81fb0c0e089ec23e915308467f0515bcc1
-
SHA512
249711de4ca1fdda7582f2236cad821e6e597a37f182a0fc61d3e77c93355403549c54228b3a326f195ae3df2f43e6e1e85bfbbfae18c2390beab673d4538453
-
SSDEEP
98304:vvkwN+MdA5wqMXh8MMhJMjarJaon7JPzf+JiUCS3swhzqgez7DoDZDJ1n6hBnLnU:vvV1UB6ylnlPzf+JiJCsmFMvcn6hVvQ
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3