General

  • Target

    svchost.exe

  • Size

    2.2MB

  • Sample

    231012-v1w7ysgd43

  • MD5

    f03dfb589547f36347100634d84b13eb

  • SHA1

    962791267c7ef9d478d67bddceab8a8132f0e44a

  • SHA256

    3bed0b372700d3421c5833e16585b22f7396d5552fd2ce166ade3f4c4236492b

  • SHA512

    fc47e9fd101e54b65ce1211efa3e48d08f2453fd5a506ab1f3587d2b4da802e243d8855f486eedf71ff3ca719da63244fe94a4896fd6002d5a587fec479cd1c1

  • SSDEEP

    24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtM:PBozBdhEV7q8bOQnIFWY+3Je0w0

Malware Config

Extracted

Family

invictastealer

C2

https://discord.com/api/webhooks/1153051665830785074/TfKGEdu77soWYKJ87ZlhijDdnFz_2XtXrUoPZiPI5e8srz5MoLDEDE5tmcfqoA0wQpT4

Targets

    • Target

      svchost.exe

    • Size

      2.2MB

    • MD5

      f03dfb589547f36347100634d84b13eb

    • SHA1

      962791267c7ef9d478d67bddceab8a8132f0e44a

    • SHA256

      3bed0b372700d3421c5833e16585b22f7396d5552fd2ce166ade3f4c4236492b

    • SHA512

      fc47e9fd101e54b65ce1211efa3e48d08f2453fd5a506ab1f3587d2b4da802e243d8855f486eedf71ff3ca719da63244fe94a4896fd6002d5a587fec479cd1c1

    • SSDEEP

      24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtM:PBozBdhEV7q8bOQnIFWY+3Je0w0

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks