General

  • Target

    SecuriteInfo.com.FileRepMalware.7168.8036.exe

  • Size

    18.1MB

  • Sample

    240203-pyhnwsbgbk

  • MD5

    4a33d5411554a30440a043d2e6fd5e6e

  • SHA1

    226c7b13480b7f1b01fbcc6f994a2de067241144

  • SHA256

    7d384c126ca153ae5d27d53dde95f4c4a5f1b284237bab45049cca321be24098

  • SHA512

    4791aad5745861437f145c9aa0ae6f94b195f6d7c9d11dc5aee0d4b81b461931ffbe982a1dd1b647578e97a69ea426e89f9b8ba01ee5cf0d4e9815fa129cef98

  • SSDEEP

    393216:JEkZQtsTTG9Hk3meBcGfd0vYM0mr+6oCWdSsl:JhQts/GJaT5F0vYFm6W

Malware Config

Targets

    • Target

      SecuriteInfo.com.FileRepMalware.7168.8036.exe

    • Size

      18.1MB

    • MD5

      4a33d5411554a30440a043d2e6fd5e6e

    • SHA1

      226c7b13480b7f1b01fbcc6f994a2de067241144

    • SHA256

      7d384c126ca153ae5d27d53dde95f4c4a5f1b284237bab45049cca321be24098

    • SHA512

      4791aad5745861437f145c9aa0ae6f94b195f6d7c9d11dc5aee0d4b81b461931ffbe982a1dd1b647578e97a69ea426e89f9b8ba01ee5cf0d4e9815fa129cef98

    • SSDEEP

      393216:JEkZQtsTTG9Hk3meBcGfd0vYM0mr+6oCWdSsl:JhQts/GJaT5F0vYFm6W

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks