General

  • Target

    RC7.exe

  • Size

    13.2MB

  • Sample

    240111-y1ejpaffbq

  • MD5

    befb565fe5a30f70e2dc55b065edd766

  • SHA1

    68116934bf8f03bfd8c75f1f9640d560cd110994

  • SHA256

    6b8fd61dd368291bc6f14ced7fd0530d7cb8f3b769ee1964798515a0b1d43864

  • SHA512

    ba34e9f1b6b77d1544182c90f8baef2432a9540696e55fb4d96cae193f9b69b1c35920264b85b72831c869df9e2cb5e5e0d4a4f9ee2011ff8719bc8fc9be89c7

  • SSDEEP

    393216:3XGD2nwW+eGQRIMTozGxu8C0ibfz6e57g1bmXiWCUI:32DawW+e5R5oztZ026e5WFVUI

Malware Config

Targets

    • Target

      RC7.exe

    • Size

      13.2MB

    • MD5

      befb565fe5a30f70e2dc55b065edd766

    • SHA1

      68116934bf8f03bfd8c75f1f9640d560cd110994

    • SHA256

      6b8fd61dd368291bc6f14ced7fd0530d7cb8f3b769ee1964798515a0b1d43864

    • SHA512

      ba34e9f1b6b77d1544182c90f8baef2432a9540696e55fb4d96cae193f9b69b1c35920264b85b72831c869df9e2cb5e5e0d4a4f9ee2011ff8719bc8fc9be89c7

    • SSDEEP

      393216:3XGD2nwW+eGQRIMTozGxu8C0ibfz6e57g1bmXiWCUI:32DawW+e5R5oztZ026e5WFVUI

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks