General

  • Target

    Tiktokgen.follower.exe

  • Size

    83KB

  • Sample

    231112-r4tz8ahb25

  • MD5

    bf3a646d1b46ff308df8af34d8cd4869

  • SHA1

    7b893e928d68c73635473d78cf143742607bad24

  • SHA256

    08ed769b18f1f3eca36f072f6b296061114022bae51e6d3baeaef46014647162

  • SHA512

    f19d218245e51e539551781ef43ebe7c8ee72aa00913da63eb0328bc80d1a9ad936e635bfecef9ca5341e043650bce56ac5adf1032067e14d34b3b67ed397ab7

  • SSDEEP

    1536:UWgYJY6QnGTsLo4nexySO5T3rZTSwEKSKt9TzpmS:NgYJYdnF84exa5TbZuwEKSKt9TVP

Malware Config

Targets

    • Target

      Tiktokgen.follower.exe

    • Size

      83KB

    • MD5

      bf3a646d1b46ff308df8af34d8cd4869

    • SHA1

      7b893e928d68c73635473d78cf143742607bad24

    • SHA256

      08ed769b18f1f3eca36f072f6b296061114022bae51e6d3baeaef46014647162

    • SHA512

      f19d218245e51e539551781ef43ebe7c8ee72aa00913da63eb0328bc80d1a9ad936e635bfecef9ca5341e043650bce56ac5adf1032067e14d34b3b67ed397ab7

    • SSDEEP

      1536:UWgYJY6QnGTsLo4nexySO5T3rZTSwEKSKt9TzpmS:NgYJYdnF84exa5TbZuwEKSKt9TVP

    • Phemedrone

      An information and wallet stealer written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks