General

  • Target

    Loader (1).exe

  • Size

    16.4MB

  • Sample

    240228-1gg7ksee76

  • MD5

    c119e3f34a0f0085c82c20f60fb7efd3

  • SHA1

    da7c25a95f7b1c4f185e9d8d86ac9435b3379eec

  • SHA256

    39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579

  • SHA512

    3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65

  • SSDEEP

    393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW

Malware Config

Targets

    • Target

      Loader (1).exe

    • Size

      16.4MB

    • MD5

      c119e3f34a0f0085c82c20f60fb7efd3

    • SHA1

      da7c25a95f7b1c4f185e9d8d86ac9435b3379eec

    • SHA256

      39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579

    • SHA512

      3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65

    • SSDEEP

      393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks