General

  • Target

    loader.zip

  • Size

    7.5MB

  • Sample

    250222-ftyd4syraj

  • MD5

    7f2f06d02b476ed73c433aa113d5b7ad

  • SHA1

    f730e74339067cf0c29e881e7b781c947fb31e31

  • SHA256

    5b8f11147d88bfde1c03ea32f2e4ba1e77a9e3aa37ff66fdc7602eb9e48769c7

  • SHA512

    bf7dd741314123dcdda5ffb4629db7d729488466fe9fc1a2afa33303ef52cffebbbbb4b39468af769378774b52280d73ef5b250cef9ac639a438df27e30e07a5

  • SSDEEP

    196608:ySmgFKBXw5qTRjax8btAZHHpSdbE98sw8aH2kTg7KnrcgE:De8qoeagE9pwlHXcgE

Malware Config

Targets

    • Target

      loader.exe

    • Size

      7.6MB

    • MD5

      f641a5b9b0ac2f79f1458c85060cf08d

    • SHA1

      ae2813fa9919f894b9f0d2cc77c7d6a36ad7080c

    • SHA256

      f60447588e7b48fdb404c0356bb80f4f226eee6cc7075455c5d4b7fe77e1b1cb

    • SHA512

      6c09626cc2651aed9c2ad55fd5d4c0fe35b22d3a960302426dfb0b5d47f79b48db3b9f4162fa46c198c59426363a8d7975e5a426ee3ef4a87499c43f1c9e5306

    • SSDEEP

      196608:GW506gq6evTwfI9jUCD6rlaZLH7qRGrGIYUoZy8FUsOnAoB:MqHgIH20drLYRZjoB

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks