General

  • Target

    1d6b30eff3edd95e36b8b2b7be0da4cc571a8d36ad88a727e150fdb6a342e20c_JC.rar

  • Size

    4.0MB

  • Sample

    230820-sdl3cshe81

  • MD5

    cb2c2c19a98fd1a5097fb7d23157e4e4

  • SHA1

    e79a36dd0817843f2d5455b8389caac18241c8de

  • SHA256

    1d6b30eff3edd95e36b8b2b7be0da4cc571a8d36ad88a727e150fdb6a342e20c

  • SHA512

    d5deed7d79766fe2a94e20493018baef7de7c26cf83cffd480384a676ce626cbbab0e1c02c6eff35e1bafc8468a88655f2fbe5b1caeb044ea23ec9d2508dfb8a

  • SSDEEP

    98304:YSnsh2RnwamWroXvnkcD1tTWkYIbggxVO6/w/RoY1jTrFR:YAK18roXvNHvbBVj0LFR

Score
10/10

Malware Config

Targets

    • Target

      Eulen gen (private)/Eulen gen (private).exe

    • Size

      1023.0MB

    • MD5

      ccd75032af4687bd714a21b97684ebd9

    • SHA1

      aa646cb9d357c77303912e9165481cbc7f82c9eb

    • SHA256

      559295f868bfa2df6833c706334d8280252107532a66627aaab12c36951ebc51

    • SHA512

      02d647cf2ced7359a472d5a6703d2fb0ff09d995e44b02673899f66780acb6f1f1b9dd9a9c276a6dda3fa103c9c61fcd6e1e29326ea5f3a9e967ddd7403ab19b

    • SSDEEP

      98304:tQf3s64R9ybzUcwti78OqJ7TPBF3ZlHHgkWJ0P39qXSaDvz:gzUcwti7TQlF3ZxxWJSUnDv

    Score
    9/10
    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks