General

  • Target

    bghKnCQqX.exe

  • Size

    536KB

  • Sample

    240211-kqkq3aed6y

  • MD5

    862ab6b0e8dffbc12eeda9a35e87d7a3

  • SHA1

    e4b43bf4074ad794ca1c2fe3da1a074a78fa6d0c

  • SHA256

    484eb8232a4ec3d75edc1de58a87deac07367d7c51bc64152f746698a73915cd

  • SHA512

    61b5fd38349638245ddd71143b3771ff3bc74764b3a5c7d85c6da01366c20f9f1584188529af7cae414c718453671d2042ff30165b1ebfdc41d60ed67a2d0ee7

  • SSDEEP

    6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU6:OPw2PjCLe3a6Q70zbYow606

Malware Config

Extracted

Family

predatorstealer

C2

http://53d5-66-154-102-195.ngrok-free.app/3g86/panel/panel/panel/Panel/

Targets

    • Target

      bghKnCQqX.exe

    • Size

      536KB

    • MD5

      862ab6b0e8dffbc12eeda9a35e87d7a3

    • SHA1

      e4b43bf4074ad794ca1c2fe3da1a074a78fa6d0c

    • SHA256

      484eb8232a4ec3d75edc1de58a87deac07367d7c51bc64152f746698a73915cd

    • SHA512

      61b5fd38349638245ddd71143b3771ff3bc74764b3a5c7d85c6da01366c20f9f1584188529af7cae414c718453671d2042ff30165b1ebfdc41d60ed67a2d0ee7

    • SSDEEP

      6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU6:OPw2PjCLe3a6Q70zbYow606

    • PredatorStealer

      Predator is a modular stealer written in C#.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies system executable filetype association

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Registers COM server for autorun

    • Accesses Microsoft Outlook profiles

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks