Resubmissions

10-02-2024 08:04

240210-jyhq1ahe5w 10

08-02-2024 12:04

240208-n8ngfsee49 10

08-02-2024 11:55

240208-n3qpmaee28 10

General

  • Target

    W.exe

  • Size

    15.4MB

  • Sample

    240208-n8ngfsee49

  • MD5

    10a8d72bff104e8c01501c8efecc615b

  • SHA1

    36a8ec8597731f51d3a51fc50c123fc84e9af979

  • SHA256

    08d20e9870aa598bfb01836af105778d40c41da7a421046b28b474bfa720dc2f

  • SHA512

    01361f9e85378281b3637218104d222cf672fb91a6a52ed5e9d2b44148cf9e2cab000f45670a59b8acb5ab55e3ad707a116f64652f20b7b35fb34594a6c49a70

  • SSDEEP

    393216:4u7L/sQxSdQuslQq99oWOv+9rztzMK9x:4CL0QQdQuSDorvSr5zV7

Malware Config

Targets

    • Target

      W.exe

    • Size

      15.4MB

    • MD5

      10a8d72bff104e8c01501c8efecc615b

    • SHA1

      36a8ec8597731f51d3a51fc50c123fc84e9af979

    • SHA256

      08d20e9870aa598bfb01836af105778d40c41da7a421046b28b474bfa720dc2f

    • SHA512

      01361f9e85378281b3637218104d222cf672fb91a6a52ed5e9d2b44148cf9e2cab000f45670a59b8acb5ab55e3ad707a116f64652f20b7b35fb34594a6c49a70

    • SSDEEP

      393216:4u7L/sQxSdQuslQq99oWOv+9rztzMK9x:4CL0QQdQuSDorvSr5zV7

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks