General

  • Target

    16492d02ab3c47a2769dc47149e1c081

  • Size

    177KB

  • Sample

    231230-mstg4abfgr

  • MD5

    16492d02ab3c47a2769dc47149e1c081

  • SHA1

    c4a54ab33520d51e2299f3873228fee50baaff37

  • SHA256

    fba1e9d79b6eeb54548efe222d7bf227eaccfe78af0000b742b415a7354560ed

  • SHA512

    a21974f5980ee968c91cf084372e33835cd6a6121d2bd379bac69c81a2f636f3c52b97de1b7fed5f559cced1ce880d98f1a77e4b8f0747fc20499bd79a9aa592

  • SSDEEP

    3072:Gkr9oRmCo02Z1rNTrFjkLtAGerlYIKJLbJYDv04MdPjigb9iAubApnW2L:GMGkC01RGLt4laJLebydLlQbAUC

Malware Config

Targets

    • Target

      Credit Hack Orange.exe

    • Size

      196KB

    • MD5

      75946508a03687238c181ef71a4cbc8a

    • SHA1

      6bc3a51f74397f7cc32350883732bd65b6415f60

    • SHA256

      26ccc4ea45bcaeab5c3bbd5b616e3db93c3f860aeedc71c4c33f91862e40263a

    • SHA512

      af932a93019935996e04316d682716e1b6de6f9d213e7dce00aa7a3d02a01b59da3c3326838f59a449eb86b6c957298f99a6a4899d0366c1c4dc7cc48e7705cf

    • SSDEEP

      3072:oTqPRLyeIKDWx85IOlKeJVos/8eRwXiUUAdV95I4Rp+LH1xrl3Ez8ub8Xr:oTqPRLdIKCC0ef//uXltKc+LVsz9b8

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks