General

  • Target

    125a5c30fd99f5f53b2914e9f6cf1627.bin

  • Size

    13.0MB

  • Sample

    231221-bhcaaafabq

  • MD5

    2dfacc9638de9dca328201db3191a4fb

  • SHA1

    ff74abd73a04ee625e7dc735912a6979ee83fbed

  • SHA256

    52fe92dcc929866e09f6af3c2f8a2a9d848757a8db6735be7bfb3fc92fa243ee

  • SHA512

    46dacfb65ca29f2d2799bebc3c15177f09e774f913def9c1c64ef169e28660b37c36cf3efd70e8ae33f55f749b77a248beba06314e3a09de5d33dec82e1e59c8

  • SSDEEP

    196608:1T2QkYQiTGqtvhFuyIS/Ewc5VlRbMJkjz+Xh1wBbf4bKWyMqII6DHIycuvd:191plFTEwol5MJkXwhML6KWy1IJncuvd

Malware Config

Targets

    • Target

      15548dc4aab59a1ecc65d7cbe37b2a6224e8be7682621e8f6b9ed851ab6f4e97.exe

    • Size

      13.2MB

    • MD5

      125a5c30fd99f5f53b2914e9f6cf1627

    • SHA1

      c26195a24760f7c6621c63bf79b8d1f36e3ec04b

    • SHA256

      15548dc4aab59a1ecc65d7cbe37b2a6224e8be7682621e8f6b9ed851ab6f4e97

    • SHA512

      a40f99dbf33afbb7a9a6f8425da9f3fdc564fcd3a8a0e8f76a830a5c6da558158ef51fb907c24897aba82c1499156aeac636ca0eeb4f527bf5ec8fb43b39905a

    • SSDEEP

      393216:iiIE7YoSD2nwW+eGQRIMTozGxu8C0ibfz6e57Z1bmXdWCUI:L7rSDawW+e5R5oztZ026e5DkVUI

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks