Resubmissions

20-02-2024 18:40

240220-xbebysdb41 1

20-02-2024 18:21

240220-wzbejadd49 7

19-02-2024 18:11

240219-wspctaac3v 1

19-02-2024 18:10

240219-wr6wgaac2s 1

19-02-2024 16:53

240219-vd32zsgf5s 1

19-02-2024 16:50

240219-vcl23sge9z 1

19-02-2024 13:03

240219-qag8wsdh32 7

19-02-2024 12:58

240219-p7qe4adg83 1

19-02-2024 12:53

240219-p4ty4sdd3z 1

19-02-2024 08:38

240219-kj4wcsbd4z 1

General

  • Target

    https://cdn.discordapp.com/attachments/1193221857156006078/1199739073842131035/Deef_64.zip

  • Sample

    240219-qag8wsdh32

Score
7/10

Malware Config

Targets

    • Target

      https://cdn.discordapp.com/attachments/1193221857156006078/1199739073842131035/Deef_64.zip

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks