Resubmissions

03-08-2023 18:08

230803-wqxamsfc55 8

03-08-2023 18:03

230803-wnhz8sfb95 8

General

  • Target

    latest.log

  • Size

    95B

  • Sample

    230803-wnhz8sfb95

  • MD5

    0e8b2feebe8cee444571e88e7ed038d3

  • SHA1

    053c9c6169ad84d372ae824c4c30ef58306ed335

  • SHA256

    17623c14c1007626fcb961166886877ed964c03e243c648b3ff848143ad41a21

  • SHA512

    d9eb3453795fc71dd55be8ae5d9951454f9edeabd83c80debda2362f9573410a48406c7c383b99412290ed3b1abb73370b45a296f764309c6bdebb8b3975aee8

Malware Config

Targets

    • Target

      latest.log

    • Size

      95B

    • MD5

      0e8b2feebe8cee444571e88e7ed038d3

    • SHA1

      053c9c6169ad84d372ae824c4c30ef58306ed335

    • SHA256

      17623c14c1007626fcb961166886877ed964c03e243c648b3ff848143ad41a21

    • SHA512

      d9eb3453795fc71dd55be8ae5d9951454f9edeabd83c80debda2362f9573410a48406c7c383b99412290ed3b1abb73370b45a296f764309c6bdebb8b3975aee8

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks