General

  • Target

    ..exe

  • Size

    15.8MB

  • Sample

    231112-2h4yeade98

  • MD5

    30110a7a62e07bb1f564a42bbbc9e015

  • SHA1

    ba37a47afeba1cc638b64554317c5bf22ca43f2a

  • SHA256

    3f6a3d41fcdd491765d0e881ce60451292a1159d8088b26abd161717fa590259

  • SHA512

    f28cc22ec98cce358adeed52646e9d4de3555cc4a2819c52b64ececefd429c49b4c267597655636cb531e9218fe53a52126ae84bc79459f8681ec347548fcfe8

  • SSDEEP

    393216:RiIE7Yo9+4u3YHi+2ohcyLkW+eGQRe9jo7BGcGqY/dt1WomY:+7r9+R3YHiRyc0kW+e5Re9MOpmY

Malware Config

Targets

    • Target

      ..exe

    • Size

      15.8MB

    • MD5

      30110a7a62e07bb1f564a42bbbc9e015

    • SHA1

      ba37a47afeba1cc638b64554317c5bf22ca43f2a

    • SHA256

      3f6a3d41fcdd491765d0e881ce60451292a1159d8088b26abd161717fa590259

    • SHA512

      f28cc22ec98cce358adeed52646e9d4de3555cc4a2819c52b64ececefd429c49b4c267597655636cb531e9218fe53a52126ae84bc79459f8681ec347548fcfe8

    • SSDEEP

      393216:RiIE7Yo9+4u3YHi+2ohcyLkW+eGQRe9jo7BGcGqY/dt1WomY:+7r9+R3YHiRyc0kW+e5Re9MOpmY

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks