General

  • Target

    7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664exe_JC.exe

  • Size

    460KB

  • Sample

    230806-l6nckaae4y

  • MD5

    3cccb0426afe6bc0ff4dfc4a071e46d1

  • SHA1

    31273d47ef275f8c2fd537806bff7bc1e95f7060

  • SHA256

    7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664

  • SHA512

    e05347abf93f333d88dd1a8dc3693f55a677fa466edf0059986beedf2af3dfe0c6f8f19828bc82205f863d2e9b2bde499cf8761aa54c9c783117fcf3dd3c4078

  • SSDEEP

    12288:9uiy8Y80UbUMg0HqBNYzM8H03kKuIZHv:9/ttFg0HXTH0zu4Hv

Score
10/10

Malware Config

Targets

    • Target

      7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664exe_JC.exe

    • Size

      460KB

    • MD5

      3cccb0426afe6bc0ff4dfc4a071e46d1

    • SHA1

      31273d47ef275f8c2fd537806bff7bc1e95f7060

    • SHA256

      7ebed8205611f34363bc35484fdfaba6da74b5de9e9c1128041bc9cb6e232664

    • SHA512

      e05347abf93f333d88dd1a8dc3693f55a677fa466edf0059986beedf2af3dfe0c6f8f19828bc82205f863d2e9b2bde499cf8761aa54c9c783117fcf3dd3c4078

    • SSDEEP

      12288:9uiy8Y80UbUMg0HqBNYzM8H03kKuIZHv:9/ttFg0HXTH0zu4Hv

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks