General

  • Target

    Bus.blender.exe

  • Size

    7.1MB

  • Sample

    230714-lh97esdh3x

  • MD5

    3d7d4d0aea6dba09a7715c3de3ec816a

  • SHA1

    a2d1ddb8f3e310e9cc88943601c57989a190065d

  • SHA256

    86cb138d4c6af8e16e711804a1fd1ddbb1ee7c8b7f56c219b13ef4ef36985fdc

  • SHA512

    7317893eac6263c43d1915d975afa56a005304c5ef9ce780e73099bc158c460567c73fb29959f3656b4675bdd47f5a370eb91e149adaa18113de1f2c522bb3a5

  • SSDEEP

    98304:OazHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqWyFXutgV5rPzO:OiQsGbT/9bvLz3S1bA329OqWMFDr5

Malware Config

Targets

    • Target

      Bus.blender.exe

    • Size

      7.1MB

    • MD5

      3d7d4d0aea6dba09a7715c3de3ec816a

    • SHA1

      a2d1ddb8f3e310e9cc88943601c57989a190065d

    • SHA256

      86cb138d4c6af8e16e711804a1fd1ddbb1ee7c8b7f56c219b13ef4ef36985fdc

    • SHA512

      7317893eac6263c43d1915d975afa56a005304c5ef9ce780e73099bc158c460567c73fb29959f3656b4675bdd47f5a370eb91e149adaa18113de1f2c522bb3a5

    • SSDEEP

      98304:OazHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqWyFXutgV5rPzO:OiQsGbT/9bvLz3S1bA329OqWMFDr5

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks