General
-
Target
Velocity.exe
-
Size
7.6MB
-
Sample
250213-cswx4s1nhp
-
MD5
8073f87f61f0625f1ec5ecc24c1c686e
-
SHA1
e03616dc46fc7c550ac1f6587db7ae72209cc642
-
SHA256
94237eac80fd2a20880180cab19b94e8760f0d1f06715ff42a6f60aef84f4adf
-
SHA512
765a854ac6a83d74176006dbb8025ea398400822bfc8a8326a73166351960da8416becfd6aeb02df510db7c1ce0571fe82590604ace99865503c3dff0d338232
-
SSDEEP
196608:HW606uB+wfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoF:cB1IH20drLYRZjoF
Behavioral task
behavioral1
Sample
Velocity.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Velocity.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
Velocity.exe
-
Size
7.6MB
-
MD5
8073f87f61f0625f1ec5ecc24c1c686e
-
SHA1
e03616dc46fc7c550ac1f6587db7ae72209cc642
-
SHA256
94237eac80fd2a20880180cab19b94e8760f0d1f06715ff42a6f60aef84f4adf
-
SHA512
765a854ac6a83d74176006dbb8025ea398400822bfc8a8326a73166351960da8416becfd6aeb02df510db7c1ce0571fe82590604ace99865503c3dff0d338232
-
SSDEEP
196608:HW606uB+wfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoF:cB1IH20drLYRZjoF
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1Defense Evasion
Modify Registry
4Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3