General

  • Target

    setup.exe

  • Size

    12.8MB

  • Sample

    240203-a5ztesfdhm

  • MD5

    a9034186fae73cf3398c5214cd450509

  • SHA1

    dc34ab8995be10abd983243eedc4ff1d1382a08a

  • SHA256

    7548bfc4fb9fa1e974e9b59ff8f712bd93608329b6126341e93d9e54f6e3311d

  • SHA512

    55f7cccfcef365645caccb96dfa7495bb8a50de8ae7b31dec13a950c38056daa8a16c68d721f9b7d81b1f068564da0676de6e0d6d71adf953b889a4a595e55a7

  • SSDEEP

    393216:du7L/5ArhQfukInEroXkakuIyzlu8pm8ZOLP/EJol72p:dCLxA1QmPErU1gyZ86K

Malware Config

Targets

    • Target

      setup.exe

    • Size

      12.8MB

    • MD5

      a9034186fae73cf3398c5214cd450509

    • SHA1

      dc34ab8995be10abd983243eedc4ff1d1382a08a

    • SHA256

      7548bfc4fb9fa1e974e9b59ff8f712bd93608329b6126341e93d9e54f6e3311d

    • SHA512

      55f7cccfcef365645caccb96dfa7495bb8a50de8ae7b31dec13a950c38056daa8a16c68d721f9b7d81b1f068564da0676de6e0d6d71adf953b889a4a595e55a7

    • SSDEEP

      393216:du7L/5ArhQfukInEroXkakuIyzlu8pm8ZOLP/EJol72p:dCLxA1QmPErU1gyZ86K

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks