General
-
Target
loader.zip
-
Size
7.5MB
-
Sample
250222-ftyd4syraj
-
MD5
7f2f06d02b476ed73c433aa113d5b7ad
-
SHA1
f730e74339067cf0c29e881e7b781c947fb31e31
-
SHA256
5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7
-
SHA512
bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5
-
SSDEEP
196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
loader.exe
-
Size
7.6MB
-
MD5
f641a5b9b0ac2f79f1458c85060cf08d
-
SHA1
ae2813fa9919f894b9f0d2cc77c7d6a36ad7080c
-
SHA256
f60447588e7b48fdb404c0356bb80f4f226eee6cc7075455c5d4b7fe77e1b1cb
-
SHA512
6c09626cc2651aed9c2ad55fd5d4c0fe35b22d3a960302426dfb0b5d47f79b48db3b9f4162fa46c198c59426363a8d7975e5a426ee3ef4a87499c43f1c9e5306
-
SSDEEP
196608:GW506gq6evTwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoB:MqHgIH20drLYRZjoB
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3