General

  • Target

    ZeusX.Laucher.exe

  • Size

    14.3MB

  • Sample

    240308-s18vmsaf88

  • MD5

    1b01d8e44dd6536a05017827d971eeb3

  • SHA1

    bfb87be15df90854ab96d54ae9ed280985d13314

  • SHA256

    4d13be4f0b77ffb1ea8efdc5dbb155d667646daf79467a8784c540e6403ce20b

  • SHA512

    fd4792afe3aa20cc8d00b02a653992d9890cc9270f84e41082608392cd2d8ae09fb578852651a1e7c90fe691460767a223660aecd39a9667c463d644225a7c7d

  • SSDEEP

    393216:ZiIE7YoPQJidQuslSq99oWOv+9fgrlrs6UT9Ew:m7rPQwdQuSDorvSYrlrqTf

Malware Config

Targets

    • Target

      ZeusX.Laucher.exe

    • Size

      14.3MB

    • MD5

      1b01d8e44dd6536a05017827d971eeb3

    • SHA1

      bfb87be15df90854ab96d54ae9ed280985d13314

    • SHA256

      4d13be4f0b77ffb1ea8efdc5dbb155d667646daf79467a8784c540e6403ce20b

    • SHA512

      fd4792afe3aa20cc8d00b02a653992d9890cc9270f84e41082608392cd2d8ae09fb578852651a1e7c90fe691460767a223660aecd39a9667c463d644225a7c7d

    • SSDEEP

      393216:ZiIE7YoPQJidQuslSq99oWOv+9fgrlrs6UT9Ew:m7rPQwdQuSDorvSYrlrqTf

    Score
    7/10
    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks