General

  • Target

    1e68e1e04a5e94d7a17f686a488051ff.bin

  • Size

    14.2MB

  • Sample

    240122-bdl9padafk

  • MD5

    5a5757287170a28c11fb280acf7d33bc

  • SHA1

    f7b09c53b692ef853a489554ab8f2d46f6b6df46

  • SHA256

    b7e3a37da040cd935c4ee79c1f55ac393d94f3c504b3cca8bd59657f47ad5b5f

  • SHA512

    be2526879c9ee457389687f3759d0ca69cc791ba8f6548df643de52079a237f9c173dce6cdbe934a32a972ae2dc0103ef13e5e7c7b42b7d98d7794097ee58751

  • SSDEEP

    393216:FNzSY9+CeNO+bKOZtxcZBpeSuyaPRiDcC89AaaIxl5T:FZcPbb2ZXxupiD+3R

Malware Config

Targets

    • Target

      32ed36fb1c3f23fbb5c9c3ca61ae089558cd85e5dec4777359c1a6ee6eb2b82e.exe

    • Size

      14.4MB

    • MD5

      1e68e1e04a5e94d7a17f686a488051ff

    • SHA1

      09122f9525a957faf0d96c81ab95bb4def243c64

    • SHA256

      32ed36fb1c3f23fbb5c9c3ca61ae089558cd85e5dec4777359c1a6ee6eb2b82e

    • SHA512

      690415cefe821465600c3539b843b443c064b00c235ff27d8f4d80d03456d8de1b32f38fc2f4f36eba6eea938e71d6a78a74e2113486f5d857bf87c5bb2a370d

    • SSDEEP

      393216:au7L/sQboidQuslSq99oWOv+9fgSMA+NT7:aCL0QbjdQuSDorvSYS6d

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks