Resubmissions

02/01/2023, 14:06

230102-reffjaef22 10

02/01/2023, 14:00

230102-ra63pahg3s 10

General

  • Target

    final.exe

  • Size

    4.5MB

  • Sample

    230102-reffjaef22

  • MD5

    23ab76d0eb93c2d63b307fb50d130903

  • SHA1

    42c0546f5afd0ea7f707207554b4a262e93d6df4

  • SHA256

    8e4722dac62bfa454b87da97afea87f61d3ba45ccd9f614a4d59f2b873cdb575

  • SHA512

    f79fb07f845f25575a3713311171db65589c48ea1b67bcdb6d2c57144e5cc5f1603bacd95fa675e6af298df5846c108ed786a1e9014cc58c199df2ccbd8a21e2

  • SSDEEP

    98304:QVDzB/NXDMfBSrMxmjDt5sobTn8koRipBJ30CrzkfUM1:QV9NXDBRXQko8BGkz6U

Malware Config

Targets

    • Target

      final.exe

    • Size

      4.5MB

    • MD5

      23ab76d0eb93c2d63b307fb50d130903

    • SHA1

      42c0546f5afd0ea7f707207554b4a262e93d6df4

    • SHA256

      8e4722dac62bfa454b87da97afea87f61d3ba45ccd9f614a4d59f2b873cdb575

    • SHA512

      f79fb07f845f25575a3713311171db65589c48ea1b67bcdb6d2c57144e5cc5f1603bacd95fa675e6af298df5846c108ed786a1e9014cc58c199df2ccbd8a21e2

    • SSDEEP

      98304:QVDzB/NXDMfBSrMxmjDt5sobTn8koRipBJ30CrzkfUM1:QV9NXDBRXQko8BGkz6U

    • Detects Eternity stealer

    • Eternity

      Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks