General

  • Target

    loader.exe

  • Size

    17.1MB

  • Sample

    230415-rj8ymsfh4t

  • MD5

    9102d61496411b2c445797ea297f23b8

  • SHA1

    dfe742be54565130ab9c01dfedffc0f23ca245a8

  • SHA256

    30f52839ef50d3cf1d98baa1ed0cf55bbd4997b12d981e737055508f87595cf4

  • SHA512

    fc0265fece5255f1cc5d73152085f6aead48854e120b7312b8dd31fcb020965cc7fe4069fb65cadf120ff6474363c107919bffa1cacf56628d0877484f57e5f7

  • SSDEEP

    393216:du7L/N1obI/bdQuslN/m3pql9AJ4ZoWOv+9fPV4alXgFg+GCICB0:dCLV1h/bdQu4KyS4ZorvS34Fg+TIA0

Malware Config

Targets

    • Target

      loader.exe

    • Size

      17.1MB

    • MD5

      9102d61496411b2c445797ea297f23b8

    • SHA1

      dfe742be54565130ab9c01dfedffc0f23ca245a8

    • SHA256

      30f52839ef50d3cf1d98baa1ed0cf55bbd4997b12d981e737055508f87595cf4

    • SHA512

      fc0265fece5255f1cc5d73152085f6aead48854e120b7312b8dd31fcb020965cc7fe4069fb65cadf120ff6474363c107919bffa1cacf56628d0877484f57e5f7

    • SSDEEP

      393216:du7L/N1obI/bdQuslN/m3pql9AJ4ZoWOv+9fPV4alXgFg+GCICB0:dCLV1h/bdQu4KyS4ZorvS34Fg+TIA0

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks