General

  • Target

    imglogger-v5.exe

  • Size

    10.0MB

  • Sample

    240221-tka44sbb76

  • MD5

    64e29447139bead045df445c2f645448

  • SHA1

    b82d84e9e09f1589d2aded8def7dfa5581288073

  • SHA256

    180c034d4b3093baa3ff06d968455a05cf55c85839020c6a185ef72957f9d9e3

  • SHA512

    b6b14c9770474dffc606d317606f65bb448bc3064a6408f2e4f1508b02fa9e3124c9e72bb80061056503dfb46270e9eaf527c3fa4023d70ce90de457b354ddd2

  • SSDEEP

    196608:JmEkN8NUF1W903eV4QR24KF5ikWMWKACyByHVKCri+81PZsV:UEkGNsW+eGQR2n/ikWMWvyQCriPDsV

Malware Config

Targets

    • Target

      imglogger-v5.exe

    • Size

      10.0MB

    • MD5

      64e29447139bead045df445c2f645448

    • SHA1

      b82d84e9e09f1589d2aded8def7dfa5581288073

    • SHA256

      180c034d4b3093baa3ff06d968455a05cf55c85839020c6a185ef72957f9d9e3

    • SHA512

      b6b14c9770474dffc606d317606f65bb448bc3064a6408f2e4f1508b02fa9e3124c9e72bb80061056503dfb46270e9eaf527c3fa4023d70ce90de457b354ddd2

    • SSDEEP

      196608:JmEkN8NUF1W903eV4QR24KF5ikWMWKACyByHVKCri+81PZsV:UEkGNsW+eGQR2n/ikWMWvyQCriPDsV

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks