General

  • Target

    5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e

  • Size

    18.0MB

  • Sample

    231004-lvl1cscf65

  • MD5

    f756a17dfe696ec8ab80d65766298ea3

  • SHA1

    8e01305af072036815852b5aa8338497c96f920c

  • SHA256

    5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e

  • SHA512

    b56c30c5b624c1d196c4bc6d6ec5146c3f50004a36b2388b68b3145139ac1f7fff4daebfc996fd8d128e1f358388a79de965d695f5b102e990cb7a571b191798

  • SSDEEP

    393216:WQtsT4aTKk3meBcGfd0NYMvv8f6lCOdSV:WQtsc+KaT5F0NYob2

Malware Config

Targets

    • Target

      5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e

    • Size

      18.0MB

    • MD5

      f756a17dfe696ec8ab80d65766298ea3

    • SHA1

      8e01305af072036815852b5aa8338497c96f920c

    • SHA256

      5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e

    • SHA512

      b56c30c5b624c1d196c4bc6d6ec5146c3f50004a36b2388b68b3145139ac1f7fff4daebfc996fd8d128e1f358388a79de965d695f5b102e990cb7a571b191798

    • SSDEEP

      393216:WQtsT4aTKk3meBcGfd0NYMvv8f6lCOdSV:WQtsc+KaT5F0NYob2

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks