General

  • Target

    maszuna.exe

  • Size

    15.7MB

  • Sample

    240212-v1n7caae6z

  • MD5

    157c7b911cf863e9a3e1cd5056360d7e

  • SHA1

    6085912861751dbb7399a36ca7c1e30b01b9b2e7

  • SHA256

    fab0d7136206d8447bdc4d4f4ee24dd60af89a14150af7cf312e5ee8c6790429

  • SHA512

    fc30f6329fc45c62d3fc04a02b03a2df2f8b8d553fdb7a3013cccf286e8d7ab69d61eda15db5d9d819d297ef55847c46166956290ff5e1cf79cbaf3432c8780e

  • SSDEEP

    393216:p6h9S2nnx837XfChATAurEUWjljEh01tiypd7XiWCoaa:pM9Dnxq7q+kdbJ914yr+Voaa

Malware Config

Targets

    • Target

      maszuna.exe

    • Size

      15.7MB

    • MD5

      157c7b911cf863e9a3e1cd5056360d7e

    • SHA1

      6085912861751dbb7399a36ca7c1e30b01b9b2e7

    • SHA256

      fab0d7136206d8447bdc4d4f4ee24dd60af89a14150af7cf312e5ee8c6790429

    • SHA512

      fc30f6329fc45c62d3fc04a02b03a2df2f8b8d553fdb7a3013cccf286e8d7ab69d61eda15db5d9d819d297ef55847c46166956290ff5e1cf79cbaf3432c8780e

    • SSDEEP

      393216:p6h9S2nnx837XfChATAurEUWjljEh01tiypd7XiWCoaa:pM9Dnxq7q+kdbJ914yr+Voaa

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks