General

  • Target

    insult.exe

  • Size

    16.2MB

  • Sample

    240313-219llsdh93

  • MD5

    ec3eabde77d5d4bd08acc0d9efde2958

  • SHA1

    dbb70782a508f6ac6a0acbba4072be900f9dada6

  • SHA256

    3e108822a54a973b0d8d7848200c98bf23eeb785adb10de2226389a339327abe

  • SHA512

    b57ed58643dbb9f318fe3b1f425af92fa47d3bd007c004a2b0361413fbfb31c5996ddd8c26356442fda152d9ed35ac3d679ed40befd443dcbedd5989cbbc4375

  • SSDEEP

    393216:NEkZQNwBhQ9LP8AxYDPCED9Zk42RiEFDay+1o:NhQiZXTCED9Zk/Ric3io

Malware Config

Targets

    • Target

      insult.exe

    • Size

      16.2MB

    • MD5

      ec3eabde77d5d4bd08acc0d9efde2958

    • SHA1

      dbb70782a508f6ac6a0acbba4072be900f9dada6

    • SHA256

      3e108822a54a973b0d8d7848200c98bf23eeb785adb10de2226389a339327abe

    • SHA512

      b57ed58643dbb9f318fe3b1f425af92fa47d3bd007c004a2b0361413fbfb31c5996ddd8c26356442fda152d9ed35ac3d679ed40befd443dcbedd5989cbbc4375

    • SSDEEP

      393216:NEkZQNwBhQ9LP8AxYDPCED9Zk42RiEFDay+1o:NhQiZXTCED9Zk/Ric3io

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks