General

  • Target

    SiVenuza Executor.rar

  • Size

    14.2MB

  • Sample

    240224-ep2ejahf2w

  • MD5

    90345f71a3520010b1a752df6c1dd0de

  • SHA1

    2fe4330ef2830e639c4e4ef5e791e8edc975b179

  • SHA256

    3035c47e04d09da3dd80e050067265d2e848cc5682b8a90b2f0c166a0835c9e9

  • SHA512

    7d3e05da1aae5c49a5fe8ce0606deebfb5831343b19279cbae21df330768dff1452561287d0584d40658eb477bc2ec97cd999d7b120c38ff3a1ef168de83bc23

  • SSDEEP

    393216:sE8mykzBYFD8Z2Qp0ZERkRKq2AMobcVwmvS0wbTLl9kA1WFmBV1Ax:sXBkz6d8g5ha3ooVwmFwbTLkNBx

Malware Config

Targets

    • Target

      SiVenuza/SiVenuza.exe

    • Size

      14.4MB

    • MD5

      d0057a37df09b6c75dc88dd3f3ffdd6e

    • SHA1

      a4d10c99c009068982a10d866821909e6bf4051e

    • SHA256

      2c3e404f0415aedb33ba56df661d8870ec9638718cd27e0e91c2f33539e57601

    • SHA512

      ce2fed6b0c32338b2d5976bbf367c004fb60711f80e32010975279f28a4b66e7b7096e6f6b8d2797faab47bbad2246060194a71c62325bc2c430578176a6c026

    • SSDEEP

      393216:Su7L/sQQndQuslSq99oWOv+9fg1XsF4Wr:SCL0QQndQuSDorvSY1ON

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks