General

  • Target

    452bd17aed5a2b8bc52638b7361f90f2.exe

  • Size

    2.8MB

  • Sample

    240106-mre83sfdh6

  • MD5

    452bd17aed5a2b8bc52638b7361f90f2

  • SHA1

    84d671e059885c7f92a29a6da05feea316287fd4

  • SHA256

    508b530d531fca2818e1e5c4bd6ab624fbea5372b51adb5661b430147482bff1

  • SHA512

    8d4a93b7e1774183c4625c34fec2cd43490bd4f5de30db8c07cde142245af6f172c7d85de4d3cae3a183d275379c352fa66a5e1f493831f9ded8848361696d30

  • SSDEEP

    49152:asmhnqAs9pJc0dnKh+Q0N1rs+vIUSg+6+8ohnRh1Na1OKM6nYAKhFQpSH3Oh5gxr:4qXpy05Q0N1rsYSZ6BoXh1kkypSH3Ohs

Malware Config

Targets

    • Target

      452bd17aed5a2b8bc52638b7361f90f2.exe

    • Size

      2.8MB

    • MD5

      452bd17aed5a2b8bc52638b7361f90f2

    • SHA1

      84d671e059885c7f92a29a6da05feea316287fd4

    • SHA256

      508b530d531fca2818e1e5c4bd6ab624fbea5372b51adb5661b430147482bff1

    • SHA512

      8d4a93b7e1774183c4625c34fec2cd43490bd4f5de30db8c07cde142245af6f172c7d85de4d3cae3a183d275379c352fa66a5e1f493831f9ded8848361696d30

    • SSDEEP

      49152:asmhnqAs9pJc0dnKh+Q0N1rs+vIUSg+6+8ohnRh1Na1OKM6nYAKhFQpSH3Oh5gxr:4qXpy05Q0N1rsYSZ6BoXh1kkypSH3Ohs

    • Modifies Windows Defender Real-time Protection settings

    • Modifies security service

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks