General

  • Target

    boom3d.exe

  • Size

    17.8MB

  • Sample

    231201-qj2nwsab2w

  • MD5

    2c606ee91c7e73451739362716c8c49c

  • SHA1

    81e8d845e22766bbb8b5ab19520d456d8d5b6c17

  • SHA256

    001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3

  • SHA512

    b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0

  • SSDEEP

    393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs

Malware Config

Targets

    • Target

      boom3d.exe

    • Size

      17.8MB

    • MD5

      2c606ee91c7e73451739362716c8c49c

    • SHA1

      81e8d845e22766bbb8b5ab19520d456d8d5b6c17

    • SHA256

      001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3

    • SHA512

      b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0

    • SSDEEP

      393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks