General

  • Target

    RabbitCheecks.exe

  • Size

    61.9MB

  • Sample

    230716-hej92sde91

  • MD5

    89e6f4c3a4dcc1c9058503a4e7d12da8

  • SHA1

    10bfead0543c1dbb180c3d8008d937730e2b93a0

  • SHA256

    d4524f9c529ffd945c789b8379116b8bb6227de2ffa045729f47a4131f3d5cfb

  • SHA512

    bcc77ba4c2dd79faec3cf1ef73306cdcab539b44def8b8977090335a6544e0fe0dfb5dd176fa9597aaa761bc8d784c0408226f38a20326bd778088be114a8e00

  • SSDEEP

    1572864:nm63awNI6DvUbKHV3rPWeroWc3bMw3u1QiUW7:m63REKHVbPW9WYbr/W7

Score
10/10

Malware Config

Targets

    • Target

      RabbitCheecks.exe

    • Size

      61.9MB

    • MD5

      89e6f4c3a4dcc1c9058503a4e7d12da8

    • SHA1

      10bfead0543c1dbb180c3d8008d937730e2b93a0

    • SHA256

      d4524f9c529ffd945c789b8379116b8bb6227de2ffa045729f47a4131f3d5cfb

    • SHA512

      bcc77ba4c2dd79faec3cf1ef73306cdcab539b44def8b8977090335a6544e0fe0dfb5dd176fa9597aaa761bc8d784c0408226f38a20326bd778088be114a8e00

    • SSDEEP

      1572864:nm63awNI6DvUbKHV3rPWeroWc3bMw3u1QiUW7:m63REKHVbPW9WYbr/W7

    Score
    10/10
    • Detects EpsilonStealer ASAR

    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks