General

  • Target

    stealer.exe

  • Size

    17.7MB

  • Sample

    240327-2nynksch64

  • MD5

    eda74fc5874c099362023377d56727fa

  • SHA1

    7062793faf37a98b596055cea5d760ebd5387f02

  • SHA256

    f0664db9f5e168258b2c16c5be6cca2bd95d89e2fa3be7a58ad98a16a9140652

  • SHA512

    95c7ff6019fe7e011763df94b87e4a12672f718fcb1c2fb1412e54e1dc0c93250897e125b82596416c9e6a7bdbb31669379b97188efdbc289002cedf8273b856

  • SSDEEP

    393216:HqPnLFXlrSQ8DOETgsvfGFHgeHkvEp6C3/q:KPLFXNSQhEw/9HS

Malware Config

Targets

    • Target

      stealer.exe

    • Size

      17.7MB

    • MD5

      eda74fc5874c099362023377d56727fa

    • SHA1

      7062793faf37a98b596055cea5d760ebd5387f02

    • SHA256

      f0664db9f5e168258b2c16c5be6cca2bd95d89e2fa3be7a58ad98a16a9140652

    • SHA512

      95c7ff6019fe7e011763df94b87e4a12672f718fcb1c2fb1412e54e1dc0c93250897e125b82596416c9e6a7bdbb31669379b97188efdbc289002cedf8273b856

    • SSDEEP

      393216:HqPnLFXlrSQ8DOETgsvfGFHgeHkvEp6C3/q:KPLFXNSQhEw/9HS

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks