General

  • Target

    soan.exe

  • Size

    17.9MB

  • Sample

    240201-g88dasdbf4

  • MD5

    635d67c69491f54b4eb2023bda710e40

  • SHA1

    ba804971c0157a44976eb6f68807cea229003219

  • SHA256

    0e74ad9b6f3e77c13cc818d7151403d85ed94d669157150ffe97d8d889c14b72

  • SHA512

    46fdac407f01d9f1f3c444a2a1a47ce7a39fe60fb56044bcedd6f593c5f63a6ba8e5212973b6118031efd9b3afe824dabf600878e773bfe711ff971e0e668223

  • SSDEEP

    393216:EqC2DlnfBfFZNRwSo67W+eGQRCMTozGxu8C0ibfz6eKk7M1bmXiWCNi:EcD1fBfFXR667W+e5RLoztZ026eKkiFi

Malware Config

Targets

    • Target

      soan.exe

    • Size

      17.9MB

    • MD5

      635d67c69491f54b4eb2023bda710e40

    • SHA1

      ba804971c0157a44976eb6f68807cea229003219

    • SHA256

      0e74ad9b6f3e77c13cc818d7151403d85ed94d669157150ffe97d8d889c14b72

    • SHA512

      46fdac407f01d9f1f3c444a2a1a47ce7a39fe60fb56044bcedd6f593c5f63a6ba8e5212973b6118031efd9b3afe824dabf600878e773bfe711ff971e0e668223

    • SSDEEP

      393216:EqC2DlnfBfFZNRwSo67W+eGQRCMTozGxu8C0ibfz6eKk7M1bmXiWCNi:EcD1fBfFXR667W+e5RLoztZ026eKkiFi

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks