General

  • Target

    693a1c35dd117816f92fc4acb491024c.bin

  • Size

    7.3MB

  • Sample

    231117-cdwc2aed3w

  • MD5

    5ea3a0ae16cd7416882bcf75ac907a4c

  • SHA1

    7acf071e1138c1f645ee7d50d39d37423d1e3126

  • SHA256

    30064423b3c2adef035b9159c2ad7fb2650ec31e34358e7321a0ca2adabd6e2a

  • SHA512

    874aa7e013d3bc30a2106ae8dc12ebbe47276b3efdf1b1b7e5e0acb00fcd876e33e611635ea5c8ca596a35e13b1d3406e01c2cbd47ecb0ee94e678148a34a8c6

  • SSDEEP

    196608:Kye783hGVa1HX7nz+/1BosslFiHKJ5hO98L8YMEb:KyI83/lLz+/fAuHKPU9g8YMEb

Malware Config

Targets

    • Target

      5772ac53f3ea00ee06f592ea27fe7f119f2027de5dcf72005a35a4302eb2d524.exe

    • Size

      7.4MB

    • MD5

      693a1c35dd117816f92fc4acb491024c

    • SHA1

      604ad5b85fda7a52050fb07cb84225cd05d10fe2

    • SHA256

      5772ac53f3ea00ee06f592ea27fe7f119f2027de5dcf72005a35a4302eb2d524

    • SHA512

      bb82172fd87e92ffcb513ee465321445db615924c8414cac75c5fa90523419b1bc854b68c57da387455416a534a48d67eb280b43769307edddc33c0b5d85a5f4

    • SSDEEP

      98304:gxeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbVv9JTSPhlVtQo1fQ:gMYmOshoKMuIkhVastRL5Di3tKdSPJQ

    Score
    8/10
    • Drops file in Drivers directory

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks