General

  • Target

    ZephyrExec.exe

  • Size

    7.6MB

  • Sample

    250220-3jv8bsxrcq

  • MD5

    ab54a57c9a91ef8ad6049cd8b390fdf8

  • SHA1

    7923378ad3acada45164b06eff8fc8901791ce74

  • SHA256

    3ab06c1340d3b7ef5d124485b62db7a8b1e684f21f2c5456ac5289f9f25ffd7b

  • SHA512

    10acb23466d99574b4abc1797170f38fe3c872f5ce604a67413329db400c8dddd2901183b7b1736b59baa648261aa6a3a258d4ce878ad513fd606f4caab0393b

  • SSDEEP

    196608:xWv06AQzgwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoJ:jU/IH20drLYRZjoJ

Malware Config

Targets

    • Target

      ZephyrExec.exe

    • Size

      7.6MB

    • MD5

      ab54a57c9a91ef8ad6049cd8b390fdf8

    • SHA1

      7923378ad3acada45164b06eff8fc8901791ce74

    • SHA256

      3ab06c1340d3b7ef5d124485b62db7a8b1e684f21f2c5456ac5289f9f25ffd7b

    • SHA512

      10acb23466d99574b4abc1797170f38fe3c872f5ce604a67413329db400c8dddd2901183b7b1736b59baa648261aa6a3a258d4ce878ad513fd606f4caab0393b

    • SSDEEP

      196608:xWv06AQzgwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoJ:jU/IH20drLYRZjoJ

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks