General

  • Target

    nagogy.bat

  • Size

    825KB

  • Sample

    230605-ha76bafb62

  • MD5

    3904e52b3c695fc9ed5597ad43ad7e1e

  • SHA1

    8d7e466864bfa7537174dbe4f415c441568eb256

  • SHA256

    30721718265f7daf74537fa568538d7401eb2d4d44956a762a5554aea9125520

  • SHA512

    5e6d13a315256c5e14085c88b81f9a19c42387b324ce75cc6fa85fa5f62ae77eb5e0e2cc17dd341c2afada8880793674f5edb542033fb8757b35356ff4551aec

  • SSDEEP

    384:Kkolp89CairObhgpwcSCDNKv6xtdBANdRxtjSQwlJeEuiHovbwwTMZ/t2nOlfUcS:hToh1X6klJ7uiHovbEsfKZTTz2Ff

Malware Config

Targets

    • Target

      nagogy.bat

    • Size

      825KB

    • MD5

      3904e52b3c695fc9ed5597ad43ad7e1e

    • SHA1

      8d7e466864bfa7537174dbe4f415c441568eb256

    • SHA256

      30721718265f7daf74537fa568538d7401eb2d4d44956a762a5554aea9125520

    • SHA512

      5e6d13a315256c5e14085c88b81f9a19c42387b324ce75cc6fa85fa5f62ae77eb5e0e2cc17dd341c2afada8880793674f5edb542033fb8757b35356ff4551aec

    • SSDEEP

      384:Kkolp89CairObhgpwcSCDNKv6xtdBANdRxtjSQwlJeEuiHovbwwTMZ/t2nOlfUcS:hToh1X6klJ7uiHovbEsfKZTTz2Ff

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks