General

  • Target

    739dcf65818715e46d3d9aad456d305d_JC.exe

  • Size

    134KB

  • Sample

    231011-1p5mvagd85

  • MD5

    739dcf65818715e46d3d9aad456d305d

  • SHA1

    fd69d2c2fa4635b601c33e1269bca46a0c0ee4c9

  • SHA256

    4d055db8aeabb6a1879df9bd362f46e4b4d817215008b793d3756f5fe1468077

  • SHA512

    f4fb52a2384123e73492a20718f0b8754c024ccaed97973e94e8c9ef595e0ae453db3a75280c5b39340ab75cba879b003d7c0233709fac3a7a2862f17b285bdb

  • SSDEEP

    3072:tKcWmjRrz3vROVXBS4ns+KS/XDLCke3SdtAacTKIbILW:+GvROVXBSR6zgOuqW

Malware Config

Targets

    • Target

      739dcf65818715e46d3d9aad456d305d_JC.exe

    • Size

      134KB

    • MD5

      739dcf65818715e46d3d9aad456d305d

    • SHA1

      fd69d2c2fa4635b601c33e1269bca46a0c0ee4c9

    • SHA256

      4d055db8aeabb6a1879df9bd362f46e4b4d817215008b793d3756f5fe1468077

    • SHA512

      f4fb52a2384123e73492a20718f0b8754c024ccaed97973e94e8c9ef595e0ae453db3a75280c5b39340ab75cba879b003d7c0233709fac3a7a2862f17b285bdb

    • SSDEEP

      3072:tKcWmjRrz3vROVXBS4ns+KS/XDLCke3SdtAacTKIbILW:+GvROVXBSR6zgOuqW

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks