General

  • Target

    Petro_Spoofer_UD.exe

  • Size

    16.9MB

  • Sample

    240222-bbyjyaaa76

  • MD5

    2f5015eeb3e9760fb760d2398dfb0f16

  • SHA1

    2403b710998adc1fdde3ad227c111681b8d72585

  • SHA256

    da133f815df4032869fae7b315019efbffe091b87c154a247bbdaa690aeb177a

  • SHA512

    70e507d77a83d8ea8b3568bcd2c1d620530b1c4ea0605ca7cc6274d345c4f491691449c46d3db829f091e2bd793c04e978cb8e7c72f865340bf2b84a16fd3ee8

  • SSDEEP

    393216:iEkZQND/vcqjmu0DbMXL2Vmd6m0RJVAzDak/ikznaIP6twmFN7t:ihQ9XXKcyVmd4DAvLpey617t

Malware Config

Targets

    • Target

      Petro_Spoofer_UD.exe

    • Size

      16.9MB

    • MD5

      2f5015eeb3e9760fb760d2398dfb0f16

    • SHA1

      2403b710998adc1fdde3ad227c111681b8d72585

    • SHA256

      da133f815df4032869fae7b315019efbffe091b87c154a247bbdaa690aeb177a

    • SHA512

      70e507d77a83d8ea8b3568bcd2c1d620530b1c4ea0605ca7cc6274d345c4f491691449c46d3db829f091e2bd793c04e978cb8e7c72f865340bf2b84a16fd3ee8

    • SSDEEP

      393216:iEkZQND/vcqjmu0DbMXL2Vmd6m0RJVAzDak/ikznaIP6twmFN7t:ihQ9XXKcyVmd4DAvLpey617t

    • Blocklisted process makes network request

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks