Resubmissions

27-10-2023 22:15

231027-158z7sac7t 10

27-10-2023 22:11

231027-14fl9sca74 10

General

  • Target

    winlogonhelp.exe

  • Size

    14.4MB

  • Sample

    231027-158z7sac7t

  • MD5

    883659842ddff81d80972bbb9741f1c6

  • SHA1

    816ef1e3b4bb2bcf09a287c8e782834edabf0e29

  • SHA256

    a0e608801566feb6f2597aed98eed1ace8093bd1400e0172ce214d3c37fa8f2a

  • SHA512

    378690f932c5fe12f059f70dc7abe6667da07f18b7ca18093b398b254a6921fe0f0a969d504b494e880cdaad11f839c8369e20b8a67d3420e0a7bacd0f3cddff

  • SSDEEP

    393216:JiIE7YoPQbjdQuslSq99oWOv+9fgF9spY4Je:W7rPQ3dQuSDorvSYPsp9J

Malware Config

Targets

    • Target

      winlogonhelp.exe

    • Size

      14.4MB

    • MD5

      883659842ddff81d80972bbb9741f1c6

    • SHA1

      816ef1e3b4bb2bcf09a287c8e782834edabf0e29

    • SHA256

      a0e608801566feb6f2597aed98eed1ace8093bd1400e0172ce214d3c37fa8f2a

    • SHA512

      378690f932c5fe12f059f70dc7abe6667da07f18b7ca18093b398b254a6921fe0f0a969d504b494e880cdaad11f839c8369e20b8a67d3420e0a7bacd0f3cddff

    • SSDEEP

      393216:JiIE7YoPQbjdQuslSq99oWOv+9fgF9spY4Je:W7rPQ3dQuSDorvSYPsp9J

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks