General

  • Target

    hoarder lifesteal overlay.exe

  • Size

    7.8MB

  • Sample

    250415-yt1tcazqt4

  • MD5

    d02b9386944c94fc20fcbcd5b4be2b49

  • SHA1

    2a53cdd4e89eedcf4092e170047ba7a08a06e35d

  • SHA256

    c6d552a9afccaaf92688218894eba03a7c788c545dc95bc7a7f8ddcba10665bb

  • SHA512

    13afce2f0388a61435e67ff6d49adafed282d989181cf61f07cbdbde707161e7f3010acc2808c7290945ab8a65dc39f4b90871e1c03ba3bf0981bfbd6eb30fd8

  • SSDEEP

    196608:UWUHUOXXKApXkj9fZwQRCgiIKpdzjPOan7j2y283TOnO+:qxCw8wIKppDO9i+

Malware Config

Targets

    • Target

      hoarder lifesteal overlay.exe

    • Size

      7.8MB

    • MD5

      d02b9386944c94fc20fcbcd5b4be2b49

    • SHA1

      2a53cdd4e89eedcf4092e170047ba7a08a06e35d

    • SHA256

      c6d552a9afccaaf92688218894eba03a7c788c545dc95bc7a7f8ddcba10665bb

    • SHA512

      13afce2f0388a61435e67ff6d49adafed282d989181cf61f07cbdbde707161e7f3010acc2808c7290945ab8a65dc39f4b90871e1c03ba3bf0981bfbd6eb30fd8

    • SSDEEP

      196608:UWUHUOXXKApXkj9fZwQRCgiIKpdzjPOan7j2y283TOnO+:qxCw8wIKppDO9i+

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • Drops file in Drivers directory

    • Clipboard Data

      Adversaries may collect data stored in the clipboard from users copying information within or between applications.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unsecured Credentials: Credentials In Files

      Steal credentials from unsecured files.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Enumerates processes with tasklist

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Target

      �p@m.pyc

    • Size

      1KB

    • MD5

      22e4d79d3019b9ac910f14b8f4ae1bf2

    • SHA1

      e0c4543a301c3bbb8b082a2c25ba4b0de5832029

    • SHA256

      10987a50848976bcfe4e5d1bf1261213d268c0f62ca69fd5794a9c76374c4bc9

    • SHA512

      e4d22d6cc02cccdf385284b7892e5e58ecca82186e5c546bff81dfc310762557175f5102180d7ed948ce115ff27e79171629c645c24ca72e141b8beacf01b720

    Score
    1/10

MITRE ATT&CK Enterprise v16

Tasks