General

  • Target

    trueking_account.exe

  • Size

    19.6MB

  • Sample

    240407-3lnahaab24

  • MD5

    e382029edd1a13e758b6809d88afe5cd

  • SHA1

    19d1fb74a9a4003bb5ffc7cb343b707f78181035

  • SHA256

    b5eafc617e4b4d8e17d28c8bf5a920aba922bd538d4bcf537320cf0a20483fe8

  • SHA512

    3f4fc7e9a6845536e494fb073d19063e866b2630da47c3ba6bae745afe45745cfcb1d0a3b3b5f8c56561b4c8483d485bdfff4b479564e078d1a0b27c5093ff9d

  • SSDEEP

    393216:Fo9Du63QD08kE7hAT0L+9qz8YSJH+1JYJGcH6dpdwqYV1:q97Qx+0+9q4YSJH+1+QcmAqc

Malware Config

Targets

    • Target

      trueking_account.exe

    • Size

      19.6MB

    • MD5

      e382029edd1a13e758b6809d88afe5cd

    • SHA1

      19d1fb74a9a4003bb5ffc7cb343b707f78181035

    • SHA256

      b5eafc617e4b4d8e17d28c8bf5a920aba922bd538d4bcf537320cf0a20483fe8

    • SHA512

      3f4fc7e9a6845536e494fb073d19063e866b2630da47c3ba6bae745afe45745cfcb1d0a3b3b5f8c56561b4c8483d485bdfff4b479564e078d1a0b27c5093ff9d

    • SSDEEP

      393216:Fo9Du63QD08kE7hAT0L+9qz8YSJH+1JYJGcH6dpdwqYV1:q97Qx+0+9q4YSJH+1+QcmAqc

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks