General

  • Target

    MonkeModManager.exe

  • Size

    17.7MB

  • Sample

    230609-v6911adf6w

  • MD5

    2a4fb7439ae9a0015a54ca4936c9a9e8

  • SHA1

    b3f0d2bdb5ed5edac4aaf228040027f4688f0ce9

  • SHA256

    0d88c785db521d4cf169530a4b47ecf2b2973d0aa5acd24f26dd4ad9d9ba3989

  • SHA512

    ea872bc6fb925bc7e3484a68a06dcd8061c32b361d7fcb0215ad2150b46f8f67e4e4b77d4c08ecc161f90a9849aca432b893ea04971ca521f60896b006552218

  • SSDEEP

    393216:NqTYszf490SdQusl7Q+l9RoWOv+9qDa/kGix1zC:NuYszfm0SdQu2QGborvSR/9QV

Malware Config

Targets

    • Target

      MonkeModManager.exe

    • Size

      17.7MB

    • MD5

      2a4fb7439ae9a0015a54ca4936c9a9e8

    • SHA1

      b3f0d2bdb5ed5edac4aaf228040027f4688f0ce9

    • SHA256

      0d88c785db521d4cf169530a4b47ecf2b2973d0aa5acd24f26dd4ad9d9ba3989

    • SHA512

      ea872bc6fb925bc7e3484a68a06dcd8061c32b361d7fcb0215ad2150b46f8f67e4e4b77d4c08ecc161f90a9849aca432b893ea04971ca521f60896b006552218

    • SSDEEP

      393216:NqTYszf490SdQusl7Q+l9RoWOv+9qDa/kGix1zC:NuYszfm0SdQu2QGborvSR/9QV

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks