General

  • Target

    ghdfg64.exe

  • Size

    14.4MB

  • Sample

    240120-yqzf4sgbd4

  • MD5

    0dc7d0b6fd6bd2e157f3be4b6b20fe4d

  • SHA1

    5784f5beb1cd3b5aa222aaf0484c52547d5759a5

  • SHA256

    f16ca2056d872f1cae446a151e057fe1d5744f6f26889881050f254008c5a5b4

  • SHA512

    8274ba73140c6c1b7005ae3fbc84f320e1e7181d12507518ba8a6854d02ceeecfca314378c8247e9bc30c85ecd4f159e15774f5fa2f8362a5911c14fd3c69160

  • SSDEEP

    393216:qiIE7YoPQPdQuslSq99oWOv+9fg/kMeTl2Y:T7rPQPdQuSDorvSY/k/l

Malware Config

Targets

    • Target

      ghdfg64.exe

    • Size

      14.4MB

    • MD5

      0dc7d0b6fd6bd2e157f3be4b6b20fe4d

    • SHA1

      5784f5beb1cd3b5aa222aaf0484c52547d5759a5

    • SHA256

      f16ca2056d872f1cae446a151e057fe1d5744f6f26889881050f254008c5a5b4

    • SHA512

      8274ba73140c6c1b7005ae3fbc84f320e1e7181d12507518ba8a6854d02ceeecfca314378c8247e9bc30c85ecd4f159e15774f5fa2f8362a5911c14fd3c69160

    • SSDEEP

      393216:qiIE7YoPQPdQuslSq99oWOv+9fg/kMeTl2Y:T7rPQPdQuSDorvSY/k/l

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks