General

  • Target

    Inuyasha(1).rar

  • Size

    63.9MB

  • Sample

    230206-xy1hpsaf9x

  • MD5

    ae49b4538e6fc96fc0307f97eda2fb36

  • SHA1

    c6b5982c5f33156f2a09f0d39132a3fcb2391f4a

  • SHA256

    cc0b8f5cd7db433e5d4ce49d9f5e488febb0fb091a80b236efad6836c6a50928

  • SHA512

    1ec8af62990a30be4c2ed3d494fa376a40efa4f0acc2972b134f073d2eff13a60c233d3bb458dd9f34a1557111b4af411f0184fa6b9dd372a0e7f221173dab9c

  • SSDEEP

    1572864:hagoCR5DC2PaQ7ID2OelIs6UgcSsRAV8g3+d9m+EGb6kZ:hu2PrEDiWbk2V8tV6o

Score
7/10

Malware Config

Targets

    • Target

      Inuyasha_Setup.exe

    • Size

      63.9MB

    • MD5

      3cd332aa253a42609b87af7c91d60685

    • SHA1

      c5016b67ac6e57858c3d8eda8275084f92636246

    • SHA256

      122ab224e758ba5096f5c4ab6516a9aeb03e99ffc42262e5d4c422961bba798b

    • SHA512

      ae7f01a50c6ad7911bbeaff00321ccfc9bd6f40d7bd1c5d5a3c71ad2c57e8d9edf68420dbb6b8cf930e377159cc2390d26ebdb21e0522300c3a14e86c8505650

    • SSDEEP

      1572864:I2syXKJyiusXeFwWqsNSIipyIwfZX5nVGhhqUahWBbnyIX79iM7:I2syXK7YwLP/0HDVGhQnSnyIXpn7

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks