General

  • Target

    SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe

  • Size

    15.8MB

  • Sample

    240119-g3rtcsgcfj

  • MD5

    0c9d8eb4648d03ea683e15eec87c67b6

  • SHA1

    24903492340b3a5ea077fde40cb48a041bcc8b08

  • SHA256

    703f97038c9cbbe49dd6e46fb67b03814b4ac4d4f2141a39aadddc0964305881

  • SHA512

    096f21839d17a53886f545e133d4fc81b36ad2b9f1350beccccfe138cbc997103106ccd7929981af2082ee3fdf15243671637bca07104921d2ff595dfef1e2e4

  • SSDEEP

    393216:rXB+4uIntpUTLfhJsW+eGQRe9jo7BGcGVo/S6fWk0/:rx+RsHUTLJSW+e5Re9M3L0/

Malware Config

Targets

    • Target

      SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe

    • Size

      15.8MB

    • MD5

      0c9d8eb4648d03ea683e15eec87c67b6

    • SHA1

      24903492340b3a5ea077fde40cb48a041bcc8b08

    • SHA256

      703f97038c9cbbe49dd6e46fb67b03814b4ac4d4f2141a39aadddc0964305881

    • SHA512

      096f21839d17a53886f545e133d4fc81b36ad2b9f1350beccccfe138cbc997103106ccd7929981af2082ee3fdf15243671637bca07104921d2ff595dfef1e2e4

    • SSDEEP

      393216:rXB+4uIntpUTLfhJsW+eGQRe9jo7BGcGVo/S6fWk0/:rx+RsHUTLJSW+e5Re9M3L0/

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks