General

  • Target

    2a5dc3ca52e9fd0c664e6803d99fd2796ada921aa4901b257986c8c5530e0906

  • Size

    2.2MB

  • Sample

    240131-g7bmyadea5

  • MD5

    6a41f06db94eeccba82831c77c484d0e

  • SHA1

    57c057daf52c3f41fac75fe679f7f67c913254d2

  • SHA256

    2a5dc3ca52e9fd0c664e6803d99fd2796ada921aa4901b257986c8c5530e0906

  • SHA512

    2013edc997ac2c507ab88f1549328fa5d35d4698975d0b957e861a56e772e13b3460024dd464fdc8aa8f71c9d2095409bdfc7dc4637fb21b363510f55a7cbae0

  • SSDEEP

    24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABto:PBozBdhEV7q8bOQnIFWY+3Je0wA

Malware Config

Extracted

Family

invictastealer

C2

https://discord.com/api/webhooks/1156227163058622554/ut4g64MNwEPB-F2sWJh9XXh6cr4ayakRbs1F8oZVdQAxsSBe1hSx5_4UJHsXt5aVwCMx

Targets

    • Target

      2a5dc3ca52e9fd0c664e6803d99fd2796ada921aa4901b257986c8c5530e0906

    • Size

      2.2MB

    • MD5

      6a41f06db94eeccba82831c77c484d0e

    • SHA1

      57c057daf52c3f41fac75fe679f7f67c913254d2

    • SHA256

      2a5dc3ca52e9fd0c664e6803d99fd2796ada921aa4901b257986c8c5530e0906

    • SHA512

      2013edc997ac2c507ab88f1549328fa5d35d4698975d0b957e861a56e772e13b3460024dd464fdc8aa8f71c9d2095409bdfc7dc4637fb21b363510f55a7cbae0

    • SSDEEP

      24576:OOfsfKozBKHAhRh3KzPSA7R7Bt28SVSVlzyQOQZ9IEb68vL4R+2pYJeCYMXABto:PBozBdhEV7q8bOQnIFWY+3Je0wA

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks