General

  • Target

    netflixexternal-x86-64.exe

  • Size

    14.0MB

  • Sample

    231123-1ycy7adf21

  • MD5

    b4035a37f7e909ec84d1327464070c0d

  • SHA1

    b8d39058e94145726ad838e7c8349797dc9864cb

  • SHA256

    a417ff6896e57f9a49ff16570cab1039279dd7aa2028e75e6959db4b1709f502

  • SHA512

    aa31dad3764587a4e3fc46a2fc9dbafc0163c1d5914c2e2833b4db3f53fa8a9642cbbacb0bc6c1a33162888f1b47bac11af734861e2f300aaeecf7015ca9b3d0

  • SSDEEP

    393216:YiIE7YoPQQ+8vdInEroXF14S2Mn8Dl+N650Tl:57rPQJ8+ErU8qsAN65+l

Malware Config

Targets

    • Target

      netflixexternal-x86-64.exe

    • Size

      14.0MB

    • MD5

      b4035a37f7e909ec84d1327464070c0d

    • SHA1

      b8d39058e94145726ad838e7c8349797dc9864cb

    • SHA256

      a417ff6896e57f9a49ff16570cab1039279dd7aa2028e75e6959db4b1709f502

    • SHA512

      aa31dad3764587a4e3fc46a2fc9dbafc0163c1d5914c2e2833b4db3f53fa8a9642cbbacb0bc6c1a33162888f1b47bac11af734861e2f300aaeecf7015ca9b3d0

    • SSDEEP

      393216:YiIE7YoPQQ+8vdInEroXF14S2Mn8Dl+N650Tl:57rPQJ8+ErU8qsAN65+l

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks