General

  • Target

    advertising.exe

  • Size

    19.9MB

  • Sample

    231012-psfmcaac7t

  • MD5

    1602161a628878a7ed669947e0cbfb51

  • SHA1

    50522bfc2ccd102abe24c6161d648cb689809dce

  • SHA256

    e45d9783e91c4af4861345ba9f21a76fee550147804cc0d9fc5f742f1d9c8b3a

  • SHA512

    cea3c8ce6798406d4d2ae1409c644285f125a0708b1c99fb00e2497e6d4c7f130e68e1cc855d8e7b61fca7e333db0234725232169adc093ea0b98ea72e15a6e5

  • SSDEEP

    393216:TiIE7YoPQtsT4Hr7M5li8k3meCcGfd0NYMbkf76lCOdSx:A7rPQtscL7M5lDaY5F0NY2x2

Malware Config

Targets

    • Target

      advertising.exe

    • Size

      19.9MB

    • MD5

      1602161a628878a7ed669947e0cbfb51

    • SHA1

      50522bfc2ccd102abe24c6161d648cb689809dce

    • SHA256

      e45d9783e91c4af4861345ba9f21a76fee550147804cc0d9fc5f742f1d9c8b3a

    • SHA512

      cea3c8ce6798406d4d2ae1409c644285f125a0708b1c99fb00e2497e6d4c7f130e68e1cc855d8e7b61fca7e333db0234725232169adc093ea0b98ea72e15a6e5

    • SSDEEP

      393216:TiIE7YoPQtsT4Hr7M5li8k3meCcGfd0NYMbkf76lCOdSx:A7rPQtscL7M5lDaY5F0NY2x2

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks