General

  • Target

    file.exe

  • Size

    7.5MB

  • Sample

    221026-vgtygsgcg8

  • MD5

    2cd6f373b7e9371f067e1c89f4fa7437

  • SHA1

    096e56e855df0e9a22f86d04165c06a30d6b71ee

  • SHA256

    95c8f8ab96fb1de5b66a6491e665d1f4a4771dc0361a3553630e6b82f333cf37

  • SHA512

    178030cb96dcfab2a9ede9437a2f8213d7f8063564b447afb4119cf46d48917feaa539d4c301fee1ba295e042808a514aee23414423ac626843d037b6a538b94

  • SSDEEP

    196608:M7Uk4sFLXNY4qejpSsqF10P1CPwDvt3uFTDC7LIKcosI3jhMSN:WFLNYDUpSfF1s1CPwDvt3uF/CfIKcoss

Malware Config

Extracted

Family

privateloader

C2

http://108.174.200.11/MWTSL

http://content.elite-hacks.ru/test/setStats.php

Targets

    • Target

      file.exe

    • Size

      7.5MB

    • MD5

      2cd6f373b7e9371f067e1c89f4fa7437

    • SHA1

      096e56e855df0e9a22f86d04165c06a30d6b71ee

    • SHA256

      95c8f8ab96fb1de5b66a6491e665d1f4a4771dc0361a3553630e6b82f333cf37

    • SHA512

      178030cb96dcfab2a9ede9437a2f8213d7f8063564b447afb4119cf46d48917feaa539d4c301fee1ba295e042808a514aee23414423ac626843d037b6a538b94

    • SSDEEP

      196608:M7Uk4sFLXNY4qejpSsqF10P1CPwDvt3uFTDC7LIKcosI3jhMSN:WFLNYDUpSfF1s1CPwDvt3uF/CfIKcoss

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks