General

  • Target

    Ro-Exec.exe

  • Size

    19.6MB

  • Sample

    240308-qwsazshb6w

  • MD5

    ed6784602fccf6f6682080047bfaedbb

  • SHA1

    72f469db722c06090e21519e91a3c6746678f0db

  • SHA256

    ef012f9f3ed64ecb5e3e2d82ef8fd71f7a800dd059652ae61517114a29d00a75

  • SHA512

    eff8064f82ebb551248c0d2cea4799ea3b320f24a0d6b43783a5b4647fcd1ba9aee969be7a6815bbb42eb4f3cb8f5cab4400064eaf760291544f7fa59c12aa23

  • SSDEEP

    393216:7h9Sl6eQnHgfOh2Jp5MgOshouIkPItRL59JGY6o9dKsv1:d9kQHgfOhfwouktRLLQgWw

Malware Config

Targets

    • Target

      Ro-Exec.exe

    • Size

      19.6MB

    • MD5

      ed6784602fccf6f6682080047bfaedbb

    • SHA1

      72f469db722c06090e21519e91a3c6746678f0db

    • SHA256

      ef012f9f3ed64ecb5e3e2d82ef8fd71f7a800dd059652ae61517114a29d00a75

    • SHA512

      eff8064f82ebb551248c0d2cea4799ea3b320f24a0d6b43783a5b4647fcd1ba9aee969be7a6815bbb42eb4f3cb8f5cab4400064eaf760291544f7fa59c12aa23

    • SSDEEP

      393216:7h9Sl6eQnHgfOh2Jp5MgOshouIkPItRL59JGY6o9dKsv1:d9kQHgfOhfwouktRLLQgWw

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks