General

  • Target

    StudioApp.exe

  • Size

    14.6MB

  • Sample

    240202-gdr3tshdcr

  • MD5

    ea6ab30812126ed8f703ecabe9f89f00

  • SHA1

    6ca5fc27c598eef84065518e7a649dfe9c1c76a2

  • SHA256

    22442d487765e55be893d7b769b48bdcc193d537aada4435954d6cbdb0563d86

  • SHA512

    117b72096463a6a15ff654a36de4f9024cf494a466b4c0fc3ea867f9614c13c98913efcecc2fe690acd6fe006b5517b787570fa3214c7d3313b8a468876a07de

  • SSDEEP

    393216:9kiIE7YoPQJidQuslSq99oWOv+9fg5SE70AQw:997rPQwdQuSDorvSY5S5At

Malware Config

Targets

    • Target

      StudioApp.exe

    • Size

      14.6MB

    • MD5

      ea6ab30812126ed8f703ecabe9f89f00

    • SHA1

      6ca5fc27c598eef84065518e7a649dfe9c1c76a2

    • SHA256

      22442d487765e55be893d7b769b48bdcc193d537aada4435954d6cbdb0563d86

    • SHA512

      117b72096463a6a15ff654a36de4f9024cf494a466b4c0fc3ea867f9614c13c98913efcecc2fe690acd6fe006b5517b787570fa3214c7d3313b8a468876a07de

    • SSDEEP

      393216:9kiIE7YoPQJidQuslSq99oWOv+9fg5SE70AQw:997rPQwdQuSDorvSY5S5At

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks