General

  • Target

    23aQJ84zcVNf

  • Size

    373KB

  • Sample

    240309-b2t97sca8z

  • MD5

    b14b83ba0436ba886b73df37bb6eab3e

  • SHA1

    83b2c61d430393fdd359622c5450b41c2ee4f86d

  • SHA256

    93a57aba9610c7dbf929c7978f9529890c32c01982d90ae75c6445c9a3e0fa58

  • SHA512

    93063c0968fee846fd46b1100660c192b49f76a65b2f4229ce01661c5797687fa931591d773a15798fb68ad2442ae1b492480c710adf8b0c3f6efcb908bed17c

  • SSDEEP

    3072:cC6+rSRprV2aDhaBKEr4TVEK1MAxAQceDex8PS9:J6+rQaBKEr4TVEK1WGPS9

Malware Config

Targets

    • Target

      23aQJ84zcVNf

    • Size

      373KB

    • MD5

      b14b83ba0436ba886b73df37bb6eab3e

    • SHA1

      83b2c61d430393fdd359622c5450b41c2ee4f86d

    • SHA256

      93a57aba9610c7dbf929c7978f9529890c32c01982d90ae75c6445c9a3e0fa58

    • SHA512

      93063c0968fee846fd46b1100660c192b49f76a65b2f4229ce01661c5797687fa931591d773a15798fb68ad2442ae1b492480c710adf8b0c3f6efcb908bed17c

    • SSDEEP

      3072:cC6+rSRprV2aDhaBKEr4TVEK1MAxAQceDex8PS9:J6+rQaBKEr4TVEK1WGPS9

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks