General

  • Target

    HorizionXbetaFIX.exe

  • Size

    30.0MB

  • Sample

    240428-lg3e7ach6w

  • MD5

    e3e408b7aaf6e1b6e41e4725ee03ec76

  • SHA1

    34f9797389b574ddef7373770795f5f001e63263

  • SHA256

    707df1515ab62e28470f1999946e7483abb5a41a4f5ac165871f56c47dc6b6a6

  • SHA512

    6e905cf221184826cbcd44a7c2b20550662437c7fdea5566dddab24f48319fe086d6054d84824fae00f68ba18c3e00cef90ed942c2aacd698895348388094cd3

  • SSDEEP

    393216:tv9zcQq08AUh2Jp5MPL+9qzTqSJHU1JfjJ+7j6dpdkqYv1:p9gQwhZ+9qHqSJHU1xj2q0qE

Malware Config

Targets

    • Target

      HorizionXbetaFIX.exe

    • Size

      30.0MB

    • MD5

      e3e408b7aaf6e1b6e41e4725ee03ec76

    • SHA1

      34f9797389b574ddef7373770795f5f001e63263

    • SHA256

      707df1515ab62e28470f1999946e7483abb5a41a4f5ac165871f56c47dc6b6a6

    • SHA512

      6e905cf221184826cbcd44a7c2b20550662437c7fdea5566dddab24f48319fe086d6054d84824fae00f68ba18c3e00cef90ed942c2aacd698895348388094cd3

    • SSDEEP

      393216:tv9zcQq08AUh2Jp5MPL+9qzTqSJHU1JfjJ+7j6dpdkqYv1:p9gQwhZ+9qHqSJHU1xj2q0qE

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks