General

  • Target

    CD.exe

  • Size

    8.1MB

  • Sample

    231016-cycfnadd24

  • MD5

    f8c769c6f8b9cbbdae5e0e0f61edd198

  • SHA1

    c598e77e2247053dc6516885358939f710157839

  • SHA256

    82bb58e3bb3607ea6dd04cbcdd46263dbe7e81bee5facfbb2263ad01b57b8d85

  • SHA512

    927c219b9ceaba55a8e9163087c91093deeed0610e76317f88d13076e38d9290db912c1e6481817bd42d47a04f61a3cacee6f2a203ff41fb8e811924e05b04ca

  • SSDEEP

    196608:LuMY0CL67cOshoKMuIkhVastRL5Di3uBrl51D730m:bY0KTOshouIkPftRL54eHREm

Malware Config

Targets

    • Target

      CD.exe

    • Size

      8.1MB

    • MD5

      f8c769c6f8b9cbbdae5e0e0f61edd198

    • SHA1

      c598e77e2247053dc6516885358939f710157839

    • SHA256

      82bb58e3bb3607ea6dd04cbcdd46263dbe7e81bee5facfbb2263ad01b57b8d85

    • SHA512

      927c219b9ceaba55a8e9163087c91093deeed0610e76317f88d13076e38d9290db912c1e6481817bd42d47a04f61a3cacee6f2a203ff41fb8e811924e05b04ca

    • SSDEEP

      196608:LuMY0CL67cOshoKMuIkhVastRL5Di3uBrl51D730m:bY0KTOshouIkPftRL54eHREm

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks