General

  • Target

    shiba_gold_menu.exe

  • Size

    14.4MB

  • Sample

    231130-m3ndtsba47

  • MD5

    ab1fd623144613f4c22c375cc511bf4c

  • SHA1

    21c672397db1d55b2c85adc66bd18636c08d7c91

  • SHA256

    e856807a3c8be6fd03584f21394646e849daed25af12690bcf1a3bbfff760e33

  • SHA512

    d7a22be508b49fa2fdd47f5f7123375248b7d216c8ef69e25728e3a0f9c26c835d7809c54b744bafb5d912b9ed54278dee88d1101026d571c6648cda4d631b1f

  • SSDEEP

    393216:uiIE7YoPQ6dQuslSq99oWOv+9fg3v0wHa+c:v7rPQ6dQuSDorvSY3v0f+

Malware Config

Targets

    • Target

      shiba_gold_menu.exe

    • Size

      14.4MB

    • MD5

      ab1fd623144613f4c22c375cc511bf4c

    • SHA1

      21c672397db1d55b2c85adc66bd18636c08d7c91

    • SHA256

      e856807a3c8be6fd03584f21394646e849daed25af12690bcf1a3bbfff760e33

    • SHA512

      d7a22be508b49fa2fdd47f5f7123375248b7d216c8ef69e25728e3a0f9c26c835d7809c54b744bafb5d912b9ed54278dee88d1101026d571c6648cda4d631b1f

    • SSDEEP

      393216:uiIE7YoPQ6dQuslSq99oWOv+9fg3v0wHa+c:v7rPQ6dQuSDorvSY3v0f+

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks