General

  • Target

    penis.exe

  • Size

    18.2MB

  • Sample

    231216-nfb8qabdak

  • MD5

    7d4d56acb60cdedb31c8aa44be15e0d4

  • SHA1

    3df1e1f5f56ac8831f4ff686ad5c901eb03057ed

  • SHA256

    e2dae09576faee6f95557bc2637816f14d612c38a4d4efd0f22200b026fd66f6

  • SHA512

    40495802422bb4b54838ff73e34650f68762da2bc5630a2fe97cb220c23550d6d805bc1b45734c50aed8aaa73c7ab2ae96471e77bcaab0953a383e3e8153e2d2

  • SSDEEP

    393216:0iIE7Yo5/27QbpUTLfhJsW+eGQRU93iOblRS/PcLz9ikmlO6oCJdntE:N7r7dUTLJSW+e5R09BR+c1iL02

Malware Config

Targets

    • Target

      penis.exe

    • Size

      18.2MB

    • MD5

      7d4d56acb60cdedb31c8aa44be15e0d4

    • SHA1

      3df1e1f5f56ac8831f4ff686ad5c901eb03057ed

    • SHA256

      e2dae09576faee6f95557bc2637816f14d612c38a4d4efd0f22200b026fd66f6

    • SHA512

      40495802422bb4b54838ff73e34650f68762da2bc5630a2fe97cb220c23550d6d805bc1b45734c50aed8aaa73c7ab2ae96471e77bcaab0953a383e3e8153e2d2

    • SSDEEP

      393216:0iIE7Yo5/27QbpUTLfhJsW+eGQRU93iOblRS/PcLz9ikmlO6oCJdntE:N7r7dUTLJSW+e5R09BR+c1iL02

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks