General

  • Target

    main.exe

  • Size

    17.7MB

  • Sample

    230609-v82seacg59

  • MD5

    b5ea3c376a758c49d624052345a9e757

  • SHA1

    7615802e8d36085a9eac85321b02bd39c6add82c

  • SHA256

    70c736925082c5db637763fe8641b2445b921793e19eeaa4f5528b8427680ccd

  • SHA512

    a4fbf37a175d91dea83281afdbc02dd8f00f31b2ef8bb4b1e764827a58fb01d37f205344b22f88389695e450a8c38e1623d64933456a2e746fb699de402d3c88

  • SSDEEP

    393216:jTYszf490SdQusl7Q+l9RoWOv+9qDa/k4ix1zC:vYszfm0SdQu2QGborvSR/9QV

Malware Config

Targets

    • Target

      main.exe

    • Size

      17.7MB

    • MD5

      b5ea3c376a758c49d624052345a9e757

    • SHA1

      7615802e8d36085a9eac85321b02bd39c6add82c

    • SHA256

      70c736925082c5db637763fe8641b2445b921793e19eeaa4f5528b8427680ccd

    • SHA512

      a4fbf37a175d91dea83281afdbc02dd8f00f31b2ef8bb4b1e764827a58fb01d37f205344b22f88389695e450a8c38e1623d64933456a2e746fb699de402d3c88

    • SSDEEP

      393216:jTYszf490SdQusl7Q+l9RoWOv+9qDa/k4ix1zC:vYszfm0SdQu2QGborvSR/9QV

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks