General

  • Target

    GolxCheats_V2.exe

  • Size

    14.4MB

  • Sample

    231022-ll7wgaha32

  • MD5

    fc7e20dee0851224167a37798c91d0ec

  • SHA1

    5d091aeaacffd0ee6ff965b0e85c3a85ea544c6b

  • SHA256

    a4fd88e3e55850dd51d118615058fe3621a5a6665796ea183084d56e730c61bd

  • SHA512

    ba5bd6780da983e051612c4a38e58d441cfd095fa6dc6ebec5c726d6dcd3811a233ca67fcfc8e1136646dd645839014266cc60034cbfb62a5fb95d6883ca00e7

  • SSDEEP

    393216:pu7L/sQbVdQuslSq99oWOv+9fg3XG8+25:pCL0QbVdQuSDorvSY3HP

Malware Config

Targets

    • Target

      GolxCheats_V2.exe

    • Size

      14.4MB

    • MD5

      fc7e20dee0851224167a37798c91d0ec

    • SHA1

      5d091aeaacffd0ee6ff965b0e85c3a85ea544c6b

    • SHA256

      a4fd88e3e55850dd51d118615058fe3621a5a6665796ea183084d56e730c61bd

    • SHA512

      ba5bd6780da983e051612c4a38e58d441cfd095fa6dc6ebec5c726d6dcd3811a233ca67fcfc8e1136646dd645839014266cc60034cbfb62a5fb95d6883ca00e7

    • SSDEEP

      393216:pu7L/sQbVdQuslSq99oWOv+9fg3XG8+25:pCL0QbVdQuSDorvSY3HP

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks