General

  • Target

    windowshosts.exe

  • Size

    23.5MB

  • Sample

    231011-2s9awaca39

  • MD5

    2612f6cfbdb7d6ed4ccbb05c8f8f9692

  • SHA1

    f3ef3ac1b67451c70da641af87e38e08cf6f95be

  • SHA256

    6d3e7b1c6ed5aea8efdbdc554a057e70d6538999fda855d5acbcb8002a15b85e

  • SHA512

    abffc24f862531476480229950d044e47cbad1f6b5c9e5be91b5142afae576086f6cc95a0bdbecde140a0ba7c07fd28b6bb590b090c5cca09315c9c88c64bae8

  • SSDEEP

    393216:dLFaWxc2QrrJFqyYgsS/XGmm0ZtH9SNaDcY1iQ:JFhW2Qrr29o73xd

Malware Config

Targets

    • Target

      windowshosts.exe

    • Size

      23.5MB

    • MD5

      2612f6cfbdb7d6ed4ccbb05c8f8f9692

    • SHA1

      f3ef3ac1b67451c70da641af87e38e08cf6f95be

    • SHA256

      6d3e7b1c6ed5aea8efdbdc554a057e70d6538999fda855d5acbcb8002a15b85e

    • SHA512

      abffc24f862531476480229950d044e47cbad1f6b5c9e5be91b5142afae576086f6cc95a0bdbecde140a0ba7c07fd28b6bb590b090c5cca09315c9c88c64bae8

    • SSDEEP

      393216:dLFaWxc2QrrJFqyYgsS/XGmm0ZtH9SNaDcY1iQ:JFhW2Qrr29o73xd

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks