Resubmissions

07-01-2024 17:58

240107-wj5y7sced9 10

07-01-2024 17:50

240107-we4kksbehl 10

General

  • Target

    GENERATOR 2.0.rar

  • Size

    50.1MB

  • Sample

    240107-wj5y7sced9

  • MD5

    dde276e78d2e553614613a729efbd72f

  • SHA1

    24bc9a4392a4e7619c85bcc117d195138b69a69d

  • SHA256

    8c704dd49e9493c8629487e92adbe7d4794073ee19aa2bf0137b5646b1998056

  • SHA512

    f4b307e6973a89ae33f523f09ab489d21cd5c86a0976731e9e2fc021dd9e1362b02c534f63e2bf259936279cd12a066f02578daf7461ad8d2c324b021009bbde

  • SSDEEP

    1572864:fa3zyrTGs8klS/dePEczOYxkqg9Sr87SYWDFm:f7CMyCEcphgAg7p8Fm

Malware Config

Targets

    • Target

      GENERATOR 2.0/GENERATOR 2.0.exe

    • Size

      50.7MB

    • MD5

      9224655def30664e25eb075940a4c6bc

    • SHA1

      05bb602202941413b7544883f2bf19ac2ed8b517

    • SHA256

      c3b66ee7b2bb35e24c67bf0fa8825a045b715c0050ba4fc2507e7c8d885a99b4

    • SHA512

      bfbbcf2a551ce0e982385c07d7bb15e747fc647b5bbf5591ff413b4b9f17ff11cb361bc8831c436ba8c33f91cf68c092da5e67470d7876fdafd04037188cd88e

    • SSDEEP

      1572864:7XGMK4XR3bLSCU/+6yPlhvhoQtHlBzW+eHfmmWu24HOGPn:7gYRPSC++6y9Ji46dn24uG

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks