General

  • Target

    zellowcrusher.exe

  • Size

    7.1MB

  • Sample

    230714-qa75baea27

  • MD5

    c7222ebe590dbd6e885909cca6f68ed9

  • SHA1

    83f7d1407c8f0c7d47c72d6ff192da55ea5973d1

  • SHA256

    50134a3a9cbc3bb4a023f07215898f040d75047d613f77f5b565dfe206583fec

  • SHA512

    463b5693f30da7364dab66a6088022e43a64516714b5234739e435e9df2f11451db4c0b693a163ff6ef236c5bf6192765ff3682b45da88eabb2de5a7e47bf43f

  • SSDEEP

    196608:fBh0QsGbT/9bvLz3S1bA329OqZSsLnFwx3wt:fWGbTlj3S1bO29OqYspwx3c

Score
7/10

Malware Config

Targets

    • Target

      zellowcrusher.exe

    • Size

      7.1MB

    • MD5

      c7222ebe590dbd6e885909cca6f68ed9

    • SHA1

      83f7d1407c8f0c7d47c72d6ff192da55ea5973d1

    • SHA256

      50134a3a9cbc3bb4a023f07215898f040d75047d613f77f5b565dfe206583fec

    • SHA512

      463b5693f30da7364dab66a6088022e43a64516714b5234739e435e9df2f11451db4c0b693a163ff6ef236c5bf6192765ff3682b45da88eabb2de5a7e47bf43f

    • SSDEEP

      196608:fBh0QsGbT/9bvLz3S1bA329OqZSsLnFwx3wt:fWGbTlj3S1bO29OqYspwx3c

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks