General

  • Target

    work.exe

  • Size

    7.0MB

  • Sample

    250210-qsfg1ssqgl

  • MD5

    cb30f8a8a14ad662caedbd266e9bbcaf

  • SHA1

    7e1ff028a97735704751a8c07316306a786c94a5

  • SHA256

    dd633dc2b0b5db1186c81cd08086aa51b6dadf2b4dc997eaffeb3c1f3ec91f9d

  • SHA512

    23265ff0e905550307720a5d2a27f5c05a786fe42c36a19ca03a7807faa23d3e4c92037c2d9284fda4108319af80c8a97f98dc1238e78697f1930a5020360363

  • SSDEEP

    98304:nfmvITBg6RXamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rN9Rh9:nkIQeNlpYfMQc2s8hn6ksqdh9

Malware Config

Targets

    • Target

      work.exe

    • Size

      7.0MB

    • MD5

      cb30f8a8a14ad662caedbd266e9bbcaf

    • SHA1

      7e1ff028a97735704751a8c07316306a786c94a5

    • SHA256

      dd633dc2b0b5db1186c81cd08086aa51b6dadf2b4dc997eaffeb3c1f3ec91f9d

    • SHA512

      23265ff0e905550307720a5d2a27f5c05a786fe42c36a19ca03a7807faa23d3e4c92037c2d9284fda4108319af80c8a97f98dc1238e78697f1930a5020360363

    • SSDEEP

      98304:nfmvITBg6RXamaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rN9Rh9:nkIQeNlpYfMQc2s8hn6ksqdh9

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Modifies Windows Firewall

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks