General

  • Target

    HitmanPro_x64.exe

  • Size

    13.6MB

  • Sample

    240428-vp44escg6y

  • MD5

    57ae72bca137c9ec15470087d2a4c378

  • SHA1

    e4dd10c770a7ec7993ed47a37d1f7182e907e3ed

  • SHA256

    cfeea4ea5121d1e6b1edbd5ca6e575830a0a4cbaf63120bc36639c44e1b89781

  • SHA512

    f80d6732e86a8d38db1ff43c0c5058013bd456c4b86b87018166ca073bc84fb8e7676b55371ae9cec668a77d198e1e7f6854a9a93581ed21a32167e3b9533f6e

  • SSDEEP

    393216:qPwSxE5xi6RP25MJFjrTuSne6Jz7N/S3:TxP2ufjrCq

Malware Config

Targets

    • Target

      HitmanPro_x64.exe

    • Size

      13.6MB

    • MD5

      57ae72bca137c9ec15470087d2a4c378

    • SHA1

      e4dd10c770a7ec7993ed47a37d1f7182e907e3ed

    • SHA256

      cfeea4ea5121d1e6b1edbd5ca6e575830a0a4cbaf63120bc36639c44e1b89781

    • SHA512

      f80d6732e86a8d38db1ff43c0c5058013bd456c4b86b87018166ca073bc84fb8e7676b55371ae9cec668a77d198e1e7f6854a9a93581ed21a32167e3b9533f6e

    • SSDEEP

      393216:qPwSxE5xi6RP25MJFjrTuSne6Jz7N/S3:TxP2ufjrCq

    • Drops file in Drivers directory

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

6
T1012

Peripheral Device Discovery

3
T1120

System Information Discovery

5
T1082

Collection

Data from Local System

1
T1005

Tasks