General

  • Target

    inuyasha.exe

  • Size

    63.9MB

  • Sample

    230213-1b1rqsgd64

  • MD5

    aadc9addc2557ab99d50848ebf709f8f

  • SHA1

    b16a1b00ff68e1ec007697b9d46f3582dc5e5de0

  • SHA256

    c6d7ce11cc50db7904c0d1cec56f7cd06335a05d66d409ede8391dbc9e62c766

  • SHA512

    77ef06289020ed7147742f3071eaab7171b88d4d9c43efc019adfc7be17a05a45436a3cf76325df2c597ee4f946c83151432ffc21a53fbc4e17d168b1fa71b09

  • SSDEEP

    1572864:W2syXKJyPMeIBG3xijp+Vkr8sUlx8W+M561oAUZRNzjqUCBkvGS079iF7:W2syX5gGM+Vkr1ibECAQPHOIGzpM7

Score
7/10

Malware Config

Targets

    • Target

      inuyasha.exe

    • Size

      63.9MB

    • MD5

      aadc9addc2557ab99d50848ebf709f8f

    • SHA1

      b16a1b00ff68e1ec007697b9d46f3582dc5e5de0

    • SHA256

      c6d7ce11cc50db7904c0d1cec56f7cd06335a05d66d409ede8391dbc9e62c766

    • SHA512

      77ef06289020ed7147742f3071eaab7171b88d4d9c43efc019adfc7be17a05a45436a3cf76325df2c597ee4f946c83151432ffc21a53fbc4e17d168b1fa71b09

    • SSDEEP

      1572864:W2syXKJyPMeIBG3xijp+Vkr8sUlx8W+M561oAUZRNzjqUCBkvGS079iF7:W2syX5gGM+Vkr1ibECAQPHOIGzpM7

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks