Analysis
-
max time kernel
93s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 19:02
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20231215-en
General
-
Target
sample.exe
-
Size
2.2MB
-
MD5
599aa41fade39e06daf4cdc87bb78bd7
-
SHA1
2543857b275ea5c6d332ab279498a5b772bd2bd4
-
SHA256
6903b00a15eff9b494947896f222bd5b093a63aa1f340815823645fd57bd61de
-
SHA512
05f7e77066cc734258e86a6622e64606afe38e748bd2d6496ed236b64ca05f9df0a10c49ed2a10ea635677f233dc40ce3745dcee0f97a1e46a1693736ddccf2c
-
SSDEEP
24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABtT:PBozBdhEV7q8bOQnIFWY+3Je0wr
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\_W0_wE0_aE0_pE0_GB_{ccdaea40-9b7f-11ee-bb3e-806e6f6e6963}_H0AiiL8EN0.zip
Filesize1.9MB
MD528e7cdf2fbde05e93da207f53d40424b
SHA1dff8aaafffa67910c2629a65751b804e4eb0dc20
SHA256aa8e3c20e0c74c21c51fe8abe3e8812bd517683daf35b705ab1353eb7c0c0dc5
SHA512b28878861dbbff088217c1e53dba5fa6c71a576469ed1a22b300531f01398ff613843ed4a2e91830cd2f706bd0c42351ffd9839cb1afa86e01fa4affe11efbeb