General

  • Target

    Fluster.exe

  • Size

    71.4MB

  • Sample

    231103-zs9kjacd56

  • MD5

    f6e90ad7978af8b733c45a114ae2bc5c

  • SHA1

    ff6969eca71af997b0e07d82fd851037339e05e2

  • SHA256

    df805af763c1bd8d18c59947c8b02aa85700c3f76f6c76b3088515a27014b390

  • SHA512

    274c16892740fc2e0eae099d539a84df89f1d252f92580a96d6439c25d8ff020912661f2473cfaaf8a5704d31ee9e8a53c3797ef09817798e5ed933e8ff4af06

  • SSDEEP

    1572864:12MQqQxHLFSk8IpG7V+VPhq73E7EgY5WHUZW8J7TwGb94VLWraSiVZDVjw:1ZQq6rFSkB05aw7wqW0IqEGCtwm

Malware Config

Targets

    • Target

      Fluster.exe

    • Size

      71.4MB

    • MD5

      f6e90ad7978af8b733c45a114ae2bc5c

    • SHA1

      ff6969eca71af997b0e07d82fd851037339e05e2

    • SHA256

      df805af763c1bd8d18c59947c8b02aa85700c3f76f6c76b3088515a27014b390

    • SHA512

      274c16892740fc2e0eae099d539a84df89f1d252f92580a96d6439c25d8ff020912661f2473cfaaf8a5704d31ee9e8a53c3797ef09817798e5ed933e8ff4af06

    • SSDEEP

      1572864:12MQqQxHLFSk8IpG7V+VPhq73E7EgY5WHUZW8J7TwGb94VLWraSiVZDVjw:1ZQq6rFSkB05aw7wqW0IqEGCtwm

    Score
    9/10
    • Enumerates VirtualBox DLL files

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Target

      discord_token_grabber.pyc

    • Size

      8KB

    • MD5

      849e6942b15c2008c7641432902645f5

    • SHA1

      60942191e1ab3c6d3edf697b57d09c1620c51710

    • SHA256

      fa4ec025ef2d20b6ebd19803e7131f6b540a7ba14d6769bfd62c37fb875a134b

    • SHA512

      0e6611f100ea22b2d5d5632cd099f87d57696b73bb9c9d10dde98477b2bb1ff927816b54ee005e07df49d6897f36ad3d858ac142ae082d25800f07597f67248a

    • SSDEEP

      192:ESB7osP1MJaugQXaafNqaclHJLOq3ZJFD/b8xjJzdJv:TP1iavQTqacyq35D0Fnv

    Score
    3/10
    • Target

      get_cookies.pyc

    • Size

      5KB

    • MD5

      2754e3152f668e31fccca7b6f275716b

    • SHA1

      e9ed74d679a96372c4457e72bc6639a4d96a2378

    • SHA256

      f7e8a57b54489b5b3de66a1d21534ced3d2a2fb1ce8d03c69d4672e62aa00dca

    • SHA512

      a8331f1c179ed97e6f3821cd41953a5ef8a0b63b6d39022cd3f7980494eff8f00b4367301509014e83c410ed4a6db8e4441f8f3547b682aca250bc4fa29f0f47

    • SSDEEP

      96:STUBj1Mvk80VDdybA6HUicwKD7dxWeBJKZLpMglcTK94:wsSl0fQfUpwKfhijMgGW94

    Score
    3/10
    • Target

      misc.pyc

    • Size

      2KB

    • MD5

      bcb404423ac51f798753e8d11e401071

    • SHA1

      9080018dae3aa157e3a97904c86af06d4a0a6873

    • SHA256

      572b18ccb1838f23714fae1c8cbb399a08796b1eb846960d5463d40ee784fe5a

    • SHA512

      25a2997cff19308956086ae4e464f5039e53149043f094f2a65dae4dfa78b6410650a3c4d1514511f23c6bf77228772fa7b8a3cf5119e4ed46edb65ac40ff800

    Score
    3/10
    • Target

      passwords_grabber.pyc

    • Size

      4KB

    • MD5

      eb063d051f6989ad0da70d9652cec7d8

    • SHA1

      165e4971fbcd15993c9cbfe077d2666047ca44ff

    • SHA256

      8abde26ef0942dbf358ab6c708bea589370d925272fe548a7a89250228edae9d

    • SHA512

      31bce5a91b037c58bf4deebf6d7ef8867e73370709a2ddc0317df8ba81b5cd524358bc4363d4e2757099d53960394da4301970116f0b7f4954b4419c28fbcd6f

    • SSDEEP

      96:2APDnTWeYwDTgWxiX79GzTOjYUyWkUUNPIslLClDWTR4bn:TzCUDxiLATmeEUNP/lL3TGbn

    Score
    3/10
    • Target

      source_prepared.pyc

    • Size

      32KB

    • MD5

      9e343f6181c8e942829c13d8e085216f

    • SHA1

      fc6e86df7a478f4138d30a4d38911e499cdba7d7

    • SHA256

      87c62fdee63cc5ebfa6d2a4cc1a958d03798776c8cca238f27bc70e3f3a6100c

    • SHA512

      c28d415285e7e3d979b6ad1dc5c9060d9c2ce29957b509b3a3f038c5d692b2e0b96a7c8c701a4cd977148b6ccbc335d0e790ba5d2a8a76e5f2081ab71f7c75c2

    • SSDEEP

      768:k8Y0NZN16OfLGfx7V2QV6gBYovUK94EBeJ:kV03Dzuxxv6JoT9Dq

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks