General

  • Target

    Liquid_Launchpad.zip

  • Size

    15.6MB

  • Sample

    231224-qtjaascadk

  • MD5

    24a4a9162a38a634a65098d57e899eaf

  • SHA1

    720cce2831692f929f8111195c719e382f1f509d

  • SHA256

    779e3a8ed0c270e31101620541c4b9388295a34d15ad2fbd8a94287120efd2e5

  • SHA512

    e46c0912b1e00b4536e26d529e6c3ddfe363f82ef6d53dc43afd74a78b7ac39e4c66951b058e6d1304a0901afe59fa87bd6877d3ab48b0595f97e2ae2b2010c2

  • SSDEEP

    393216:n+8TptsSbDv4c50LD6Pn4+ya159Qnd0Gs6sLdSipnMuWQ:nBtRbTF50LGPn4ZQod0Gs6s3MuWQ

Malware Config

Targets

    • Target

      Liquid_Launchpad/Liquid_Launchpad.exe

    • Size

      16.0MB

    • MD5

      4d16f7ccb5733a04fd1a31514029e987

    • SHA1

      b97162b50316f2e8317a650786f7b2ff749c411e

    • SHA256

      001e2f7c446b4a7b58aea6240850507a4b0b38192a87016f546aefa8dbaf62a1

    • SHA512

      4393e1a65008d5f875ce6eaa62f00dff068ce2604dd8f24c31c82de8faee17b5b24292464c2ced64a9938d3a6941bb2f86875e9d8d9a110ebfd155c8505be325

    • SSDEEP

      393216:LiIE7YoSD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57e1bmXdWCUI:47rSDaHUTLJSW+e5RLoztZ026e58kVUI

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks