General

  • Target

    GameManager.exe

  • Size

    61.8MB

  • Sample

    230823-yb9zasfb39

  • MD5

    9e900e26296c24c4d4b63cc0799b72e1

  • SHA1

    b391c5aea4395ec12257f6728f70aedbdc77cf15

  • SHA256

    36c4cbd4c053f90cb106351105b24013175a5c54579686b0b843f66c8be533d7

  • SHA512

    30861db2683b18db21571bcbb79256cf308376f6663c9699f80f1665f10419974697a6e7a1e966792f6d947d4449a2746ad95bd6fc6e97838c8a5284d64a40bc

  • SSDEEP

    1572864:tm6EokMW03hHc29xDQyLo5jQ1Z4wP3KaTVBG9xlagaa:g6EokKRHc291Qy0uZ4wSCV8xlagaa

Score
7/10

Malware Config

Targets

    • Target

      GameManager.exe

    • Size

      61.8MB

    • MD5

      9e900e26296c24c4d4b63cc0799b72e1

    • SHA1

      b391c5aea4395ec12257f6728f70aedbdc77cf15

    • SHA256

      36c4cbd4c053f90cb106351105b24013175a5c54579686b0b843f66c8be533d7

    • SHA512

      30861db2683b18db21571bcbb79256cf308376f6663c9699f80f1665f10419974697a6e7a1e966792f6d947d4449a2746ad95bd6fc6e97838c8a5284d64a40bc

    • SSDEEP

      1572864:tm6EokMW03hHc29xDQyLo5jQ1Z4wP3KaTVBG9xlagaa:g6EokKRHc291Qy0uZ4wSCV8xlagaa

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks