General

  • Target

    sample

  • Size

    2.2MB

  • Sample

    231219-xps29sbdd8

  • MD5

    599aa41fade39e06daf4cdc87bb78bd7

  • SHA1

    2543857b275ea5c6d332ab279498a5b772bd2bd4

  • SHA256

    6903b00a15eff9b494947896f222bd5b093a63aa1f340815823645fd57bd61de

  • SHA512

    05f7e77066cc734258e86a6622e64606afe38e748bd2d6496ed236b64ca05f9df0a10c49ed2a10ea635677f233dc40ce3745dcee0f97a1e46a1693736ddccf2c

  • SSDEEP

    24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtT:PBozBdhEV7q8bOQnIFWY+3Je0wr

Malware Config

Extracted

Family

invictastealer

C2

https://discord.com/api/webhooks/1110287049946320998/uyTnampjCkaqlmY3zq9Nkv6G_91GPzEdPgHuAcHKfCfnzZ7_O8fwe4BV2xqjwRKKnqtz

Targets

    • Target

      sample

    • Size

      2.2MB

    • MD5

      599aa41fade39e06daf4cdc87bb78bd7

    • SHA1

      2543857b275ea5c6d332ab279498a5b772bd2bd4

    • SHA256

      6903b00a15eff9b494947896f222bd5b093a63aa1f340815823645fd57bd61de

    • SHA512

      05f7e77066cc734258e86a6622e64606afe38e748bd2d6496ed236b64ca05f9df0a10c49ed2a10ea635677f233dc40ce3745dcee0f97a1e46a1693736ddccf2c

    • SSDEEP

      24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtT:PBozBdhEV7q8bOQnIFWY+3Je0wr

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks