General

  • Target

    App1234.exe

  • Size

    4.0MB

  • Sample

    231001-v7mxvscb8t

  • MD5

    e8a7ed6986b1178188c27b9761f39762

  • SHA1

    3693c63cbe3ca5812d69b6afc64aff27fcd486ba

  • SHA256

    e7df475c90b173430ea4bc85e2006a7e03b7ada50323c1e9fc6dc85d6265a18f

  • SHA512

    f561b04e9402ad93a2c43e3c2f3ac264c9f7dad7a133fc0bcb5d5f682d2f6c7e0935c1da3855840c834c63459b1566fd5cace8c0f438e883e489bbfc4663afea

  • SSDEEP

    98304:B3CNpyBPtb7dRfe/HEkxUzTFDxbIVZNjn98ftpkHf:B2Itb7dRfe/HEeUzTXYbu7

Score
7/10

Malware Config

Targets

    • Target

      App1234.exe

    • Size

      4.0MB

    • MD5

      e8a7ed6986b1178188c27b9761f39762

    • SHA1

      3693c63cbe3ca5812d69b6afc64aff27fcd486ba

    • SHA256

      e7df475c90b173430ea4bc85e2006a7e03b7ada50323c1e9fc6dc85d6265a18f

    • SHA512

      f561b04e9402ad93a2c43e3c2f3ac264c9f7dad7a133fc0bcb5d5f682d2f6c7e0935c1da3855840c834c63459b1566fd5cace8c0f438e883e489bbfc4663afea

    • SSDEEP

      98304:B3CNpyBPtb7dRfe/HEkxUzTFDxbIVZNjn98ftpkHf:B2Itb7dRfe/HEeUzTXYbu7

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks