General

  • Target

    sample.exe

  • Size

    11.2MB

  • Sample

    230324-whafxaae3v

  • MD5

    76f8adebd04166c5ec531b1c810fada9

  • SHA1

    752dedbd48f0d060e41d292644708cc354311d33

  • SHA256

    0a24b4a359571c7cc94b68adf2e806f0a89b563d00646a67f0ec804195929fc7

  • SHA512

    c17e998987b63b7a8fcb5cb2405b60d356851db2e91efad9e1f12769493436172c2a2a1bac309b2b20053d15327599bed68359d5ab9914fb21230fe670ac56a6

  • SSDEEP

    196608:eol4XkYU1gkb/YRAFpSmvdsCnc64njQthsiHzzvU3pa617k0Cxyt6UT9hsZV3xAR:b0XUikbQRU9vaCnc/nKhsSGpa617dCCD

Malware Config

Targets

    • Target

      sample.exe

    • Size

      11.2MB

    • MD5

      76f8adebd04166c5ec531b1c810fada9

    • SHA1

      752dedbd48f0d060e41d292644708cc354311d33

    • SHA256

      0a24b4a359571c7cc94b68adf2e806f0a89b563d00646a67f0ec804195929fc7

    • SHA512

      c17e998987b63b7a8fcb5cb2405b60d356851db2e91efad9e1f12769493436172c2a2a1bac309b2b20053d15327599bed68359d5ab9914fb21230fe670ac56a6

    • SSDEEP

      196608:eol4XkYU1gkb/YRAFpSmvdsCnc64njQthsiHzzvU3pa617k0Cxyt6UT9hsZV3xAR:b0XUikbQRU9vaCnc/nKhsSGpa617dCCD

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks