Resubmissions

23-02-2024 14:40

240223-r1583scb5w 10

General

  • Target

    esp and aimbot.exe

  • Size

    14.4MB

  • Sample

    240223-r1583scb5w

  • MD5

    a2eec729d72fe550ad6f08ed74d10b5c

  • SHA1

    8aeff77c539fc006cd968052678de9d73cdfc99c

  • SHA256

    27966ee7482797adad4840838bded44ecb78bc9bcdbd4a16a753d777cfc0bd25

  • SHA512

    2014574b4a724d1604e461e50f14489a825ef7c3a1404397cd5d4f9aa16c2d0bf6cc9f3069d89bb2c5fea3e6a5ebe0ac04c8eaab7b5efe38400290d6add2cea1

  • SSDEEP

    393216:yEkZQJidQuslSq99oWOv+9fgpFO8Mqvst:yhQwdQuSDorvSYpFBlv

Malware Config

Targets

    • Target

      esp and aimbot.exe

    • Size

      14.4MB

    • MD5

      a2eec729d72fe550ad6f08ed74d10b5c

    • SHA1

      8aeff77c539fc006cd968052678de9d73cdfc99c

    • SHA256

      27966ee7482797adad4840838bded44ecb78bc9bcdbd4a16a753d777cfc0bd25

    • SHA512

      2014574b4a724d1604e461e50f14489a825ef7c3a1404397cd5d4f9aa16c2d0bf6cc9f3069d89bb2c5fea3e6a5ebe0ac04c8eaab7b5efe38400290d6add2cea1

    • SSDEEP

      393216:yEkZQJidQuslSq99oWOv+9fgpFO8Mqvst:yhQwdQuSDorvSYpFBlv

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks