General
-
Target
hoarder lifesteal overlay.exe
-
Size
7.8MB
-
Sample
250415-yt1tcazqt4
-
MD5
d02b9386944c94fc20fcbcd5b4be2b49
-
SHA1
2a53cdd4e89eedcf4092e170047ba7a08a06e35d
-
SHA256
c6d552a9afccaaf92688218894eba03a7c788c545dc95bc7a7f8ddcba10665bb
-
SHA512
13afce2f0388a61435e67ff6d49adafed282d989181cf61f07cbdbde707161e7f3010acc2808c7290945ab8a65dc39f4b90871e1c03ba3bf0981bfbd6eb30fd8
-
SSDEEP
196608:UWUHUOXXKApXkj9fZwQRCgiIKpdzjPOan7j2y283TOnO+:qxCw8wIKppDO9i+
Behavioral task
behavioral1
Sample
hoarder lifesteal overlay.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
hoarder lifesteal overlay.exe
Resource
win11-20250410-en
Behavioral task
behavioral3
Sample
�p@m.pyc
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
�p@m.pyc
Resource
win11-20250410-en
Malware Config
Targets
-
-
Target
hoarder lifesteal overlay.exe
-
Size
7.8MB
-
MD5
d02b9386944c94fc20fcbcd5b4be2b49
-
SHA1
2a53cdd4e89eedcf4092e170047ba7a08a06e35d
-
SHA256
c6d552a9afccaaf92688218894eba03a7c788c545dc95bc7a7f8ddcba10665bb
-
SHA512
13afce2f0388a61435e67ff6d49adafed282d989181cf61f07cbdbde707161e7f3010acc2808c7290945ab8a65dc39f4b90871e1c03ba3bf0981bfbd6eb30fd8
-
SSDEEP
196608:UWUHUOXXKApXkj9fZwQRCgiIKpdzjPOan7j2y283TOnO+:qxCw8wIKppDO9i+
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
�p@m.pyc
-
Size
1KB
-
MD5
22e4d79d3019b9ac910f14b8f4ae1bf2
-
SHA1
e0c4543a301c3bbb8b082a2c25ba4b0de5832029
-
SHA256
10987a50848976bcfe4e5d1bf1261213d268c0f62ca69fd5794a9c76374c4bc9
-
SHA512
e4d22d6cc02cccdf385284b7892e5e58ecca82186e5c546bff81dfc310762557175f5102180d7ed948ce115ff27e79171629c645c24ca72e141b8beacf01b720
Score1/10 -
MITRE ATT&CK Enterprise v16
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3