General

  • Target

    f54b114cb8524fbd1702a053086d93c6.bin

  • Size

    7.3MB

  • Sample

    240224-e3fpzsaa3w

  • MD5

    f54b114cb8524fbd1702a053086d93c6

  • SHA1

    da77b2cbeec09905fcbbe66fbbcdf9bbefd4b2dc

  • SHA256

    006d467ca75ef53ab6b0154a636a7db3d11ca4b4669e72c7e41f61269db09cba

  • SHA512

    4813e369acbeb7c4abbd5f761f5efd3a42bdc481ca092fa3b99323c739d6e58d49e284af715efa325820cbe391c42d98be7782892687d5561097622f675665c9

  • SSDEEP

    196608:YNYS6AOshoKMuIkhVastRL5Di3u41D7dJh:MYSrOshouIkPftRL54VRDh

Malware Config

Targets

    • Target

      f54b114cb8524fbd1702a053086d93c6.bin

    • Size

      7.3MB

    • MD5

      f54b114cb8524fbd1702a053086d93c6

    • SHA1

      da77b2cbeec09905fcbbe66fbbcdf9bbefd4b2dc

    • SHA256

      006d467ca75ef53ab6b0154a636a7db3d11ca4b4669e72c7e41f61269db09cba

    • SHA512

      4813e369acbeb7c4abbd5f761f5efd3a42bdc481ca092fa3b99323c739d6e58d49e284af715efa325820cbe391c42d98be7782892687d5561097622f675665c9

    • SSDEEP

      196608:YNYS6AOshoKMuIkhVastRL5Di3u41D7dJh:MYSrOshouIkPftRL54VRDh

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks