General
-
Target
work.exe
-
Size
6.9MB
-
Sample
250210-rkeq7avlh1
-
MD5
bdabbc5b7b6f2b0e88c36487b84f5b7d
-
SHA1
c2babdb89bf3c5a714c26d6ac5889de5b9dab81c
-
SHA256
551f6a88e84a3cf6a39400b1525bff5d4e58b5f1e860d598e73ff9a62270d4ad
-
SHA512
030e4c6b35ce0f4a13f4d36d828ec99ad1198c46c5685d2dcd8707d23d8a85c6ae836569222645b66c51d6fd2c1ccdcef3cb8b47795bea4f0168ad1dd6795f46
-
SSDEEP
98304:FK6vITBg6/D4amaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rN9RW:FVIpeNlpYfMQc2s8hn6ksqdhs
Behavioral task
behavioral1
Sample
work.exe
Resource
win11-20250210-en
Malware Config
Targets
-
-
Target
work.exe
-
Size
6.9MB
-
MD5
bdabbc5b7b6f2b0e88c36487b84f5b7d
-
SHA1
c2babdb89bf3c5a714c26d6ac5889de5b9dab81c
-
SHA256
551f6a88e84a3cf6a39400b1525bff5d4e58b5f1e860d598e73ff9a62270d4ad
-
SHA512
030e4c6b35ce0f4a13f4d36d828ec99ad1198c46c5685d2dcd8707d23d8a85c6ae836569222645b66c51d6fd2c1ccdcef3cb8b47795bea4f0168ad1dd6795f46
-
SSDEEP
98304:FK6vITBg6/D4amaHl3Ne4i3lqoFhTWrf9eQc0MJYzwZNqkz+as5J1n6ksB0rN9RW:FVIpeNlpYfMQc2s8hn6ksqdhs
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Modifies Windows Firewall
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1