General

  • Target

    blxstealer.exe

  • Size

    16.7MB

  • Sample

    230608-tk2xtshd7v

  • MD5

    9bbb694fc0cb499dd359d4488ae35f99

  • SHA1

    45a7f31a8fce3da4bc02ca55bffd181353385ca2

  • SHA256

    f667852cb3c04ef2f9afd282d00b2ec2c423e9f8e00811af2964255554a48842

  • SHA512

    1fbdebe4eadd6afc63b5668dfeb73fadf694a1c4ac212b5b5a6eaa6a00d527a3d2865de8c46ab650ffd3f2d03130ac3b42a691749b348e78438f332a7d6ada41

  • SSDEEP

    196608:pi0sKYu/PaQts15uN4FMIZETSRjPePdrQJM96KbABLOqie8VCtzYPOCl8de/yzyF:GQtsIQETSRvJQnqOqF8YzdCyd3AZ

Malware Config

Targets

    • Target

      blxstealer.exe

    • Size

      16.7MB

    • MD5

      9bbb694fc0cb499dd359d4488ae35f99

    • SHA1

      45a7f31a8fce3da4bc02ca55bffd181353385ca2

    • SHA256

      f667852cb3c04ef2f9afd282d00b2ec2c423e9f8e00811af2964255554a48842

    • SHA512

      1fbdebe4eadd6afc63b5668dfeb73fadf694a1c4ac212b5b5a6eaa6a00d527a3d2865de8c46ab650ffd3f2d03130ac3b42a691749b348e78438f332a7d6ada41

    • SSDEEP

      196608:pi0sKYu/PaQts15uN4FMIZETSRjPePdrQJM96KbABLOqie8VCtzYPOCl8de/yzyF:GQtsIQETSRvJQnqOqF8YzdCyd3AZ

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks