Analysis
-
max time kernel
51s -
max time network
63s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
28-05-2023 21:27
Static task
static1
General
-
Target
InvictaStealer.exe
-
Size
2.2MB
-
MD5
3cc5939fe454a7419768c909ff77e50b
-
SHA1
01c18fd0bcecb17b843143292b8c5005c5e7b20c
-
SHA256
3c0322fae5759334d5f37ec23abf9c12a038f298eae3665d47ca2e131a32f996
-
SHA512
62be7426e6c27c806a71f912144865d58a5425ff8f33de3d2faf0c74ae1e07bc31f5645f46454923783a3665e456f0e584e0b284c29ec2410d88b55946d681e1
-
SSDEEP
24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtS:PBozBdhEV7q8bOQnIFWY+3Je0wq
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_W0_wE0_aE0_pE0_NL_{0338073a-b1a2-11ed-9ee7-806e6f6e6963}_R66gU1Q3Wv.zip
Filesize2.5MB
MD5018c43af38ba1a7a2fb8b097b0754e37
SHA117a4be5dfed86b7d95543898b16b11392566a5fc
SHA256cb2268311ec01c69b41f4fc911427bcd08dfd955293d778e3d3fe392cb33e55f
SHA51261774fffb96afb575fd6d162e9b25d681ae5b28095832da4bf814a982d1b77ccef684b0a3ccdf3cb1d339ac3b6ffd1122a50b044ca92f345d907685d2aee2d89