Resubmissions

21/05/2023, 14:34

230521-rxv9psdc5y 7

21/05/2023, 14:29

230521-rtz4gsae59 8

General

  • Target

    Kerelin_Logger.exe

  • Size

    14.3MB

  • Sample

    230521-rxv9psdc5y

  • MD5

    c1f844e9eea973a5035c6fd8cfd8eef3

  • SHA1

    c8583a8a060ebfcbd42bda46459fda83831d00e0

  • SHA256

    580debd3017ff4544ce5b53ae207e7084ed6d54989fd2b0f810415d2303428c4

  • SHA512

    dc75ba0e50e65faff48c711d4d44199cf0dbb3f46291d63fb3a058bcfd04027fbbe011179bceda2400729089fae3323a30724792680a133f7a46cdfd9ca5328e

  • SSDEEP

    393216:Ru7L/qdQusl7Q+q9RoWOv+9faqNW5mCVVf:RCLydQu2QdborvSikW4CVh

Malware Config

Targets

    • Target

      Kerelin_Logger.exe

    • Size

      14.3MB

    • MD5

      c1f844e9eea973a5035c6fd8cfd8eef3

    • SHA1

      c8583a8a060ebfcbd42bda46459fda83831d00e0

    • SHA256

      580debd3017ff4544ce5b53ae207e7084ed6d54989fd2b0f810415d2303428c4

    • SHA512

      dc75ba0e50e65faff48c711d4d44199cf0dbb3f46291d63fb3a058bcfd04027fbbe011179bceda2400729089fae3323a30724792680a133f7a46cdfd9ca5328e

    • SSDEEP

      393216:Ru7L/qdQusl7Q+q9RoWOv+9faqNW5mCVVf:RCLydQu2QdborvSikW4CVh

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks