General

  • Target

    https://cdn.discordapp.com/attachments/1347892827874525194/1347892829258514473/AMKZ_Python_.gg_datas.exe?ex=67e68705&is=67e53585&hm=2d6b4effc58c2da7a3b01dc38e60b908f884d0a794c0d8843732be41986e4bea&

  • Sample

    250327-zvtl4aznz7

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1347892827874525194/1347892829258514473/AMKZ_Python_.gg_datas.exe?ex=67e68705&is=67e53585&hm=2d6b4effc58c2da7a3b01dc38e60b908f884d0a794c0d8843732be41986e4bea&

    • Boot or Logon Autostart Execution: Active Setup

      Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • System Binary Proxy Execution: Rundll32

      Abuse Rundll32 to proxy execution of malicious code.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks