Resubmissions

03-02-2024 17:04

240203-vlj9vagdgl 10

03-02-2024 16:59

240203-vhgdsaead8 10

General

  • Target

    imglogger.exe

  • Size

    15.1MB

  • Sample

    240203-vhgdsaead8

  • MD5

    f7885f6eb7f24c705673b2bc636aa37f

  • SHA1

    30495fb2a2415a39e6cd42198d1281cbc0f85f1a

  • SHA256

    f6200c2c6a783b91beda7c166c26e6f0755dec715dab2cac71cf102c9242892f

  • SHA512

    bd2c356824f56164b17649fdc5cba30047359dbb4696b1c458e671a90573463fd636d1826d3c7bf78943b75c0ceaf8e320d6f385dde97c055f849c99ecbcf49f

  • SSDEEP

    393216:U3iIE7YopTRk3meCcGfdYYM0G9bYXN9kIEuBUrfzA3/:T7rRRaY5FYYFWcXLh+zzAP

Malware Config

Targets

    • Target

      imglogger.exe

    • Size

      15.1MB

    • MD5

      f7885f6eb7f24c705673b2bc636aa37f

    • SHA1

      30495fb2a2415a39e6cd42198d1281cbc0f85f1a

    • SHA256

      f6200c2c6a783b91beda7c166c26e6f0755dec715dab2cac71cf102c9242892f

    • SHA512

      bd2c356824f56164b17649fdc5cba30047359dbb4696b1c458e671a90573463fd636d1826d3c7bf78943b75c0ceaf8e320d6f385dde97c055f849c99ecbcf49f

    • SSDEEP

      393216:U3iIE7YopTRk3meCcGfdYYM0G9bYXN9kIEuBUrfzA3/:T7rRRaY5FYYFWcXLh+zzAP

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks