General

  • Target

    Unban.exe

  • Size

    15.8MB

  • Sample

    240114-plbd2sage7

  • MD5

    8575bf542cb7ea7b24c262cbad6236bc

  • SHA1

    503b6f7ca3e41c4c25de0f53ef9848e9ccb7a333

  • SHA256

    7c443e4eb98e13875771d1b77dafd45ca3079a32a917d571fffb4d60f23d797f

  • SHA512

    3f5333859a685d9fcf7c016abe749784052008238a6bcc6084bf29dbd7057c9aa9cf89757add09f015cfb73fc9a8d588295c617979295cc827c636c6aa465a9f

  • SSDEEP

    393216:WiIE7YoSDBntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57v0b8X6Wkg0:X7rSDJHUTLJSW+e5RLoztZ026e5IbLg0

Malware Config

Targets

    • Target

      Unban.exe

    • Size

      15.8MB

    • MD5

      8575bf542cb7ea7b24c262cbad6236bc

    • SHA1

      503b6f7ca3e41c4c25de0f53ef9848e9ccb7a333

    • SHA256

      7c443e4eb98e13875771d1b77dafd45ca3079a32a917d571fffb4d60f23d797f

    • SHA512

      3f5333859a685d9fcf7c016abe749784052008238a6bcc6084bf29dbd7057c9aa9cf89757add09f015cfb73fc9a8d588295c617979295cc827c636c6aa465a9f

    • SSDEEP

      393216:WiIE7YoSDBntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57v0b8X6Wkg0:X7rSDJHUTLJSW+e5RLoztZ026e5IbLg0

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks