General

  • Target

    0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb

  • Size

    11.6MB

  • Sample

    231111-fb3k4sbg65

  • MD5

    bc2d0d2db3abf1547a20ecc2ef80ac02

  • SHA1

    bd3175ceef88f3b715cea519ebd74ec5202fa99a

  • SHA256

    0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb

  • SHA512

    a85e40088090df4f167d323b6dbe357ee647d57c80e8fa96bcdf26a5b25fb5912eccd79abc2e3ed9b0e98ec4ff0284d3267aa2ee001cc7605123909c0b5c9b60

  • SSDEEP

    196608:VNh64RGdML3MLjv+bhqNVoBPD7fEXEoY2Iv9jM2W1vk93Ii6SfiIU1Wom:ZUdML3cL+9qz8PD7fEU2IhY/dt1Wom

Malware Config

Targets

    • Target

      0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb

    • Size

      11.6MB

    • MD5

      bc2d0d2db3abf1547a20ecc2ef80ac02

    • SHA1

      bd3175ceef88f3b715cea519ebd74ec5202fa99a

    • SHA256

      0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb

    • SHA512

      a85e40088090df4f167d323b6dbe357ee647d57c80e8fa96bcdf26a5b25fb5912eccd79abc2e3ed9b0e98ec4ff0284d3267aa2ee001cc7605123909c0b5c9b60

    • SSDEEP

      196608:VNh64RGdML3MLjv+bhqNVoBPD7fEXEoY2Iv9jM2W1vk93Ii6SfiIU1Wom:ZUdML3cL+9qz8PD7fEU2IhY/dt1Wom

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks