Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2023, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20230712-en
General
-
Target
download.exe
-
Size
440KB
-
MD5
93e9bcee099beb60565371ae5c1fe38d
-
SHA1
776ce72540e8d484be2d0f7c22f8f2989625a074
-
SHA256
e762f5eb7951d68fd2959c543f44681cc14a879de39b7d55eb73294b4bcdbea0
-
SHA512
93c1ef54a5fffac7f955fff988abf66d0ec161f5dc2a900b50937da1f038b0828ccef62873db684b64aed3aa8069c18490f76dda8757bfd1e79701b3e3ab9bc1
-
SSDEEP
6144:8gDSDFzFXHzaoMTt7JlyhRe/XChH41oW4g+Ehf:I4xCsSGJh
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.ipify.org 17 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4924 download.exe 4924 download.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4924 download.exe