General

  • Target

    PAP46E1UkZ.exe

  • Size

    17.1MB

  • Sample

    230320-vbqnwage71

  • MD5

    8ef9e6f6e33937d4137e0b4ca5fabb07

  • SHA1

    f9e4208c615691ed7fb36d6973f8eeb0c1cb2adf

  • SHA256

    99e94275ebb5df4a70d8d225ead56cc295f915a5ee1f93d3e33432f1fc46ac4a

  • SHA512

    b2b9bd8df7d4e9e3afd6b28847f0b0ae88ff452c1f6d19c02f9061d61f05d3b20f8a4bbaaefbaf23eab16d82373aa1d722ed3ac08ec8fff9ff9582c709b845cd

  • SSDEEP

    393216:qQHu7L/WwAyXYPh8TInEroX/lh2plfEqirRRovon2P4j75rHOz1:lCL+TyXYErUNQppwvMo2B

Malware Config

Targets

    • Target

      PAP46E1UkZ.exe

    • Size

      17.1MB

    • MD5

      8ef9e6f6e33937d4137e0b4ca5fabb07

    • SHA1

      f9e4208c615691ed7fb36d6973f8eeb0c1cb2adf

    • SHA256

      99e94275ebb5df4a70d8d225ead56cc295f915a5ee1f93d3e33432f1fc46ac4a

    • SHA512

      b2b9bd8df7d4e9e3afd6b28847f0b0ae88ff452c1f6d19c02f9061d61f05d3b20f8a4bbaaefbaf23eab16d82373aa1d722ed3ac08ec8fff9ff9582c709b845cd

    • SSDEEP

      393216:qQHu7L/WwAyXYPh8TInEroX/lh2plfEqirRRovon2P4j75rHOz1:lCL+TyXYErUNQppwvMo2B

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks