General

  • Target

    b76fbc81bbb7f3108d27d9da9e2646aeb3769fba62bf7961f79306812de3486c.exe

  • Size

    5.9MB

  • Sample

    240212-fpfnhaec53

  • MD5

    f917c77f60c3c1ac6dbbadbf366ddd30

  • SHA1

    7614669bcb33170bbb3df2f95a5fbe3328e4bdff

  • SHA256

    b76fbc81bbb7f3108d27d9da9e2646aeb3769fba62bf7961f79306812de3486c

  • SHA512

    3610dec0b646a53ea8a35d3f83c580b32e6d41c4a4ffac81bc715d2aad5125c3377a368917a7f63269ad57140322cd12dfa80b8aa5af90efd36fca964087f8f3

  • SSDEEP

    98304:rRF+nhjji65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFp9hjkrw0ZUc:rOnrDOYjJlpZstQoS9Hf12VKXybjCM5u

Malware Config

Targets

    • Target

      b76fbc81bbb7f3108d27d9da9e2646aeb3769fba62bf7961f79306812de3486c.exe

    • Size

      5.9MB

    • MD5

      f917c77f60c3c1ac6dbbadbf366ddd30

    • SHA1

      7614669bcb33170bbb3df2f95a5fbe3328e4bdff

    • SHA256

      b76fbc81bbb7f3108d27d9da9e2646aeb3769fba62bf7961f79306812de3486c

    • SHA512

      3610dec0b646a53ea8a35d3f83c580b32e6d41c4a4ffac81bc715d2aad5125c3377a368917a7f63269ad57140322cd12dfa80b8aa5af90efd36fca964087f8f3

    • SSDEEP

      98304:rRF+nhjji65sn6Wfz7pnxCjJaWlpx1dstaNoSwKHf1c3z5MOueAeFp9hjkrw0ZUc:rOnrDOYjJlpZstQoS9Hf12VKXybjCM5u

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks