General

  • Target

    PAP46E1UkZ.exe

  • Size

    10.5MB

  • Sample

    230202-p3kztaac81

  • MD5

    b4db983541306b7f022d00257f9a2be4

  • SHA1

    d81e57cd7ebef7b2f7f303c34ed753ac876a93c0

  • SHA256

    be09abc6ca5eef2d72c95366a96256167b631fbf32b6e700d5ca29618aa2219f

  • SHA512

    aa99b5852b5cac89575a0ed48503efcdd76e90db14c8c1b80ec5310ef3e4496f5df5ff623580ac9082e4371bfd66af83a731fb1bb638ede35060b4ef95405229

  • SSDEEP

    196608:KuS916RfhanM9gL9MwVDr/A/dJIiVRyG24nF1M4LIVnyrGLGuWTZiRagVPbqj:mYxInM2L9MOr/4IRannM4+pL+FiRJB2j

Malware Config

Targets

    • Target

      PAP46E1UkZ.exe

    • Size

      10.5MB

    • MD5

      b4db983541306b7f022d00257f9a2be4

    • SHA1

      d81e57cd7ebef7b2f7f303c34ed753ac876a93c0

    • SHA256

      be09abc6ca5eef2d72c95366a96256167b631fbf32b6e700d5ca29618aa2219f

    • SHA512

      aa99b5852b5cac89575a0ed48503efcdd76e90db14c8c1b80ec5310ef3e4496f5df5ff623580ac9082e4371bfd66af83a731fb1bb638ede35060b4ef95405229

    • SSDEEP

      196608:KuS916RfhanM9gL9MwVDr/A/dJIiVRyG24nF1M4LIVnyrGLGuWTZiRagVPbqj:mYxInM2L9MOr/4IRannM4+pL+FiRJB2j

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks