General

  • Target

    VoidOfSpace2.exe

  • Size

    61.9MB

  • Sample

    230824-zbbbeafd84

  • MD5

    a7d32278018ab365b2bad7d9ce298cf1

  • SHA1

    5770a7d641c8e8602835e7b56f080d7f12358d8c

  • SHA256

    0d19d40ff767e99b383fd72e4c3052ab5c68d751b9ece784ef53423bf940028f

  • SHA512

    202e2a08f0e556580148da34e241cdaebfb021415d357677d38eed7b29c5832f684b48ec86f6e8923d681252c53172eb00fef829163181b01679c45e7a05d911

  • SSDEEP

    1572864:4m6xMPHCDfXpcY/HPLDkYDO37J4JPnMOKwZ4ryOp0DfNcSwa:b6x7qY/HPHlC3fwZiy3fea

Malware Config

Targets

    • Target

      VoidOfSpace2.exe

    • Size

      61.9MB

    • MD5

      a7d32278018ab365b2bad7d9ce298cf1

    • SHA1

      5770a7d641c8e8602835e7b56f080d7f12358d8c

    • SHA256

      0d19d40ff767e99b383fd72e4c3052ab5c68d751b9ece784ef53423bf940028f

    • SHA512

      202e2a08f0e556580148da34e241cdaebfb021415d357677d38eed7b29c5832f684b48ec86f6e8923d681252c53172eb00fef829163181b01679c45e7a05d911

    • SSDEEP

      1572864:4m6xMPHCDfXpcY/HPLDkYDO37J4JPnMOKwZ4ryOp0DfNcSwa:b6x7qY/HPHlC3fwZiy3fea

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks