General

  • Target

    Built.exe

  • Size

    7.3MB

  • Sample

    231007-xkzz1see8v

  • MD5

    e1d763aeb60d7834d65a3679ec7e5937

  • SHA1

    997f4f7de90a22880b25241b4d7d8b0339786754

  • SHA256

    9f8c2ad49aaf02abfe57d6f54482b65d3e24170a70cb2073c88ecc885fc4cdd3

  • SHA512

    a479981895784c580da0ed1b82896a08b77402542b82a2792c9e7af76ca04b096dc8a7575dc3e8b327f97483a8821821caa4edc4304cbaa9a7c439ef4a98f71e

  • SSDEEP

    196608:bucYAFQjOOshoKMuIkhVastRL5Di3uTIuQd/07:NYAVOshouIkPftRL54huis7

Malware Config

Targets

    • Target

      Built.exe

    • Size

      7.3MB

    • MD5

      e1d763aeb60d7834d65a3679ec7e5937

    • SHA1

      997f4f7de90a22880b25241b4d7d8b0339786754

    • SHA256

      9f8c2ad49aaf02abfe57d6f54482b65d3e24170a70cb2073c88ecc885fc4cdd3

    • SHA512

      a479981895784c580da0ed1b82896a08b77402542b82a2792c9e7af76ca04b096dc8a7575dc3e8b327f97483a8821821caa4edc4304cbaa9a7c439ef4a98f71e

    • SSDEEP

      196608:bucYAFQjOOshoKMuIkhVastRL5Di3uTIuQd/07:NYAVOshouIkPftRL54huis7

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks