General

  • Target

    optimizer.exe

  • Size

    14.4MB

  • Sample

    230706-1bhk6aed59

  • MD5

    7f50fbb86583fc6a235f95fd1c830f7d

  • SHA1

    834e5162d00f62ef9e4157f7e5759032e1f7e26b

  • SHA256

    b0dc635244e8b3344f376083280191ec2cb0cab0c277d5959ff2c09a4eea23ae

  • SHA512

    cd16b477fa1ee329f25b24aa634b16d8c7856168fcf4849a6216ae03b8e4a33249bba66bd263a93252c9f35afe9c8b876796ba17211192b123580e486e67bfcb

  • SSDEEP

    196608:6v0sKYu/PaQ+DuvfcdQmRJ8dA6lSuqaycBIGpEqo6hTOv+QKfwJN1ifxLrRGlQJf:2QQdQuslSq9RoWOv+9fgqyQ9qYH9

Malware Config

Targets

    • Target

      optimizer.exe

    • Size

      14.4MB

    • MD5

      7f50fbb86583fc6a235f95fd1c830f7d

    • SHA1

      834e5162d00f62ef9e4157f7e5759032e1f7e26b

    • SHA256

      b0dc635244e8b3344f376083280191ec2cb0cab0c277d5959ff2c09a4eea23ae

    • SHA512

      cd16b477fa1ee329f25b24aa634b16d8c7856168fcf4849a6216ae03b8e4a33249bba66bd263a93252c9f35afe9c8b876796ba17211192b123580e486e67bfcb

    • SSDEEP

      196608:6v0sKYu/PaQ+DuvfcdQmRJ8dA6lSuqaycBIGpEqo6hTOv+QKfwJN1ifxLrRGlQJf:2QQdQuslSq9RoWOv+9fgqyQ9qYH9

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks