General

  • Target

    Stealer.exe

  • Size

    1.7MB

  • Sample

    240214-rp7mrsea63

  • MD5

    796bdd6562d082791632868158563e4b

  • SHA1

    f079f0d21a2ed45557b1446c4921021e7b93ccb5

  • SHA256

    c4f5af43a7dfbf4a7e9b679cce1cb0b574e6050f9f26e84c2bd674722c4fa049

  • SHA512

    fd03697b31d094171310035d352086885bb8f150d9461b716ed197655a1d282c8898a0c48856ccd0ef27bdc7706216be8e977657aee5681bc19087e7da4de2e4

  • SSDEEP

    49152:Rm3V5CdiVW6pBQo/RXH5MPoYvnqrIOYE54yAFsAo8HP/:Y3VodOW6Ld/JHWPonIfydv8HP/

Score
7/10
upx

Malware Config

Targets

    • Target

      Stealer.exe

    • Size

      1.7MB

    • MD5

      796bdd6562d082791632868158563e4b

    • SHA1

      f079f0d21a2ed45557b1446c4921021e7b93ccb5

    • SHA256

      c4f5af43a7dfbf4a7e9b679cce1cb0b574e6050f9f26e84c2bd674722c4fa049

    • SHA512

      fd03697b31d094171310035d352086885bb8f150d9461b716ed197655a1d282c8898a0c48856ccd0ef27bdc7706216be8e977657aee5681bc19087e7da4de2e4

    • SSDEEP

      49152:Rm3V5CdiVW6pBQo/RXH5MPoYvnqrIOYE54yAFsAo8HP/:Y3VodOW6Ld/JHWPonIfydv8HP/

    Score
    7/10
    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks