Resubmissions

03/07/2023, 21:09

230703-zzwl9aab48 7

03/07/2023, 21:00

230703-zths7sab42 8

General

  • Target

    Spoofer_V2.exe

  • Size

    7.0MB

  • Sample

    230703-zzwl9aab48

  • MD5

    c891d597d2cf96b3bc2b21e4e4077c62

  • SHA1

    e0d5f4dd9d987c562bdaf9432364dda940243bd3

  • SHA256

    6a8fca780453dadf8ae7af201f70f07192a2108b769babe8d6f7057cb6cec227

  • SHA512

    e95c80adad137e473f0117c4f277d7c98f385ba72791a6176020b7c6bc76d9a30d3582af6ddf774a79007573f15af72762cac161a20cdd499f4109d5fe33076d

  • SSDEEP

    98304:rrzHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqGCiEpRmOZc8:rnQsGbT/9bvLz3S1bA329OqGCiEpYOZj

Score
7/10

Malware Config

Targets

    • Target

      Spoofer_V2.exe

    • Size

      7.0MB

    • MD5

      c891d597d2cf96b3bc2b21e4e4077c62

    • SHA1

      e0d5f4dd9d987c562bdaf9432364dda940243bd3

    • SHA256

      6a8fca780453dadf8ae7af201f70f07192a2108b769babe8d6f7057cb6cec227

    • SHA512

      e95c80adad137e473f0117c4f277d7c98f385ba72791a6176020b7c6bc76d9a30d3582af6ddf774a79007573f15af72762cac161a20cdd499f4109d5fe33076d

    • SSDEEP

      98304:rrzHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqGCiEpRmOZc8:rnQsGbT/9bvLz3S1bA329OqGCiEpYOZj

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks