General

  • Target

    loader.zip

  • Size

    7.5MB

  • Sample

    250222-fef7aaxqhz

  • MD5

    7f2f06d02b476ed73c433aa113d5b7ad

  • SHA1

    f730e74339067cf0c29e881e7b781c947fb31e31

  • SHA256

    5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7

  • SHA512

    bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5

  • SSDEEP

    196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE

Malware Config

Targets

    • Target

      loader.zip

    • Size

      7.5MB

    • MD5

      7f2f06d02b476ed73c433aa113d5b7ad

    • SHA1

      f730e74339067cf0c29e881e7b781c947fb31e31

    • SHA256

      5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7

    • SHA512

      bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5

    • SSDEEP

      196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops desktop.ini file(s)

    • Checks system information in the registry

      System information is often read in order to detect sandboxing environments.

    • Target

      loader.exe

    • Size

      7.6MB

    • MD5

      f641a5b9b0ac2f79f1458c85060cf08d

    • SHA1

      ae2813fa9919f894b9f0d2cc77c7d6a36ad7080c

    • SHA256

      f60447588e7b48fdb404c0356bb80f4f226eee6cc7075455c5d4b7fe77e1b1cb

    • SHA512

      6c09626cc2651aed9c2ad55fd5d4c0fe35b22d3a960302426dfb0b5d47f79b48db3b9f4162fa46c198c59426363a8d7975e5a426ee3ef4a87499c43f1c9e5306

    • SSDEEP

      196608:GW506gq6evTwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoB:MqHgIH20drLYRZjoB

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      @��:pHM.pyc

    • Size

      1KB

    • MD5

      6cd66b2f40400ee779c6e42477a4b375

    • SHA1

      04d272dcd105191dbecf2334493a3f85051acfe8

    • SHA256

      394e24d501014bd27d6fb7c1b8201f47a1dcea7a31e3160fee1d1df44520b2ae

    • SHA512

      272d524e2b2f84340fd09dec17e72c25fece5a3c717e3fab79209982ed3efcbdf343ce5ae4613e7b561314060b9f1bbc382443f7642d27142088b34089ae6ff6

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks