General

  • Target

    6e0f22d3c54d7680dd7d1a284f546d509a25d4a0e00d534733d23649c1904122.exe

  • Size

    13.1MB

  • Sample

    240225-fqccgaca95

  • MD5

    ffad668e3893f27d0011b0acbc580477

  • SHA1

    23ec45c30d56f48fd70ce794c4ffe8df53d0fc93

  • SHA256

    6e0f22d3c54d7680dd7d1a284f546d509a25d4a0e00d534733d23649c1904122

  • SHA512

    1930ca8726f0fa9435f84f484dc99d3925308d065a498270fa427241134bbf99d0bba3e58baea71a982a3c585014f4957acaa97a0aea343157cb14ca3a3080ab

  • SSDEEP

    393216:SO+TZ1nFOl+bzkCu1tsTmtCyJnQYSvWXr/:SlZ1nS8Du126tCmb

Malware Config

Targets

    • Target

      6e0f22d3c54d7680dd7d1a284f546d509a25d4a0e00d534733d23649c1904122.exe

    • Size

      13.1MB

    • MD5

      ffad668e3893f27d0011b0acbc580477

    • SHA1

      23ec45c30d56f48fd70ce794c4ffe8df53d0fc93

    • SHA256

      6e0f22d3c54d7680dd7d1a284f546d509a25d4a0e00d534733d23649c1904122

    • SHA512

      1930ca8726f0fa9435f84f484dc99d3925308d065a498270fa427241134bbf99d0bba3e58baea71a982a3c585014f4957acaa97a0aea343157cb14ca3a3080ab

    • SSDEEP

      393216:SO+TZ1nFOl+bzkCu1tsTmtCyJnQYSvWXr/:SlZ1nS8Du126tCmb

    • An infostealer written in Python and packaged with PyInstaller.

    • crealstealer

      An infostealer written in Python and packaged with PyInstaller.

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Detects executables Discord URL observed in first stage droppers

    • Detects executables containing SQL queries to confidential data stores. Observed in infostealers

    • Detects executables containing URLs to raw contents of a Github gist

    • Detects executables packed with VMProtect.

    • Executes dropped EXE

    • Loads dropped DLL

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Enterprise v15

Tasks