General

  • Target

    StormLab_setup.rar

  • Size

    16.6MB

  • Sample

    240317-nz3vsaec21

  • MD5

    ce18b3945b25bbf690fe99a90f2aa1ad

  • SHA1

    321ccba1d4b9179ad03dd31bb3e48c056caa50a8

  • SHA256

    7d8f73ced906313777bdf50b173ab35b6281cf4c79ad48a4bd4e71c908e7a54a

  • SHA512

    60609c850c17041c1e0dc640382115f1c5c9a3a4e02920534fa4e88ac5791ba87f030f97d149aa18a3ba6ae1ab1b2c296fb7a484000c448cebc9dc815e720a5d

  • SSDEEP

    393216:0wZlBgSuHSA7Jd0rssYDVXcmUzXoE0+ydwN4ir/t8SP2esTVn2l9y+UO6:nTBgSuP7JEsHVX3UToEjydwN40/t8SP4

Malware Config

Targets

    • Target

      StormLab_setup.rar

    • Size

      16.6MB

    • MD5

      ce18b3945b25bbf690fe99a90f2aa1ad

    • SHA1

      321ccba1d4b9179ad03dd31bb3e48c056caa50a8

    • SHA256

      7d8f73ced906313777bdf50b173ab35b6281cf4c79ad48a4bd4e71c908e7a54a

    • SHA512

      60609c850c17041c1e0dc640382115f1c5c9a3a4e02920534fa4e88ac5791ba87f030f97d149aa18a3ba6ae1ab1b2c296fb7a484000c448cebc9dc815e720a5d

    • SSDEEP

      393216:0wZlBgSuHSA7Jd0rssYDVXcmUzXoE0+ydwN4ir/t8SP2esTVn2l9y+UO6:nTBgSuP7JEsHVX3UToEjydwN40/t8SP4

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks