General

  • Target

    WinLiveInfo (1).exe

  • Size

    20.8MB

  • Sample

    250328-v194tayyhs

  • MD5

    8b4bd3821cab86b9c961b0481a064cfc

  • SHA1

    1caf1ba2fe2c8f15a9d4392b4839a0f7b643aaaf

  • SHA256

    06f6595b8642674f097dd5962f01a17b775a194fc28e4d7163c8ada15deaa47a

  • SHA512

    ea3d6c02a520f4afa91d18c2aeaf8553e5db6927747c078c546422f234cc453eb522de33fec7a83e97bbba72093e268bf1f3aaa16ded5e3be5256742e9b2d055

  • SSDEEP

    393216:wh9S6Ac+TGz7kMIEZhgYBvWg1WPbBzM/wH:a9H97lBBvWg1sbhf

Malware Config

Targets

    • Target

      WinLiveInfo (1).exe

    • Size

      20.8MB

    • MD5

      8b4bd3821cab86b9c961b0481a064cfc

    • SHA1

      1caf1ba2fe2c8f15a9d4392b4839a0f7b643aaaf

    • SHA256

      06f6595b8642674f097dd5962f01a17b775a194fc28e4d7163c8ada15deaa47a

    • SHA512

      ea3d6c02a520f4afa91d18c2aeaf8553e5db6927747c078c546422f234cc453eb522de33fec7a83e97bbba72093e268bf1f3aaa16ded5e3be5256742e9b2d055

    • SSDEEP

      393216:wh9S6Ac+TGz7kMIEZhgYBvWg1WPbBzM/wH:a9H97lBBvWg1sbhf

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks