General

  • Target

    a2efe5fedee03e88e8026d85e38046c4.bin

  • Size

    2.2MB

  • Sample

    231213-dcdx2afbal

  • MD5

    a2efe5fedee03e88e8026d85e38046c4

  • SHA1

    f1a664004d7e73ae36fa44c108f0deb48fac57ca

  • SHA256

    08c33d014b5684b54000ec99a5eb4b23cbe5c3e73554de0e7fd7e3e730d18e45

  • SHA512

    998252744f5ef0579bd5d2e053aee98a0d2cf7aba97e5fffc0970306f115260652f10414c9f96ae60cf030559f6b447566ee7def049e9a34c5c330a537b33207

  • SSDEEP

    24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABt5:PBozBdhEV7q8bOQnIFWY+3Je0wx

Malware Config

Extracted

Family

invictastealer

C2

https://discord.com/api/webhooks/1182500767643475968/F2GdgMIDq6qS3rnZqKZRPlrGSIX1QqPeY17uUFv3DI2aIHuupk1SncT1_g7OZApv5eyP

Targets

    • Target

      a2efe5fedee03e88e8026d85e38046c4.bin

    • Size

      2.2MB

    • MD5

      a2efe5fedee03e88e8026d85e38046c4

    • SHA1

      f1a664004d7e73ae36fa44c108f0deb48fac57ca

    • SHA256

      08c33d014b5684b54000ec99a5eb4b23cbe5c3e73554de0e7fd7e3e730d18e45

    • SHA512

      998252744f5ef0579bd5d2e053aee98a0d2cf7aba97e5fffc0970306f115260652f10414c9f96ae60cf030559f6b447566ee7def049e9a34c5c330a537b33207

    • SSDEEP

      24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABt5:PBozBdhEV7q8bOQnIFWY+3Je0wx

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks