General

  • Target

    Node-js.exe

  • Size

    63.5MB

  • Sample

    240408-n8lmvsgf92

  • MD5

    52131512ecfb302895d8165fcb4b5425

  • SHA1

    d94c0b3801a084527eaf8d160f5915c6d7b568bc

  • SHA256

    79ae38d3832ab7d48543039eff6078538465eb83d8fbb124db2e319295ab5e68

  • SHA512

    0c56edfa095008fa930bcfaec3345a560d5455a62e54f1988e88a25562506d065f57b2f9e9a5a0ecb6e96c36b917c41710764eecc00187d2d75acd6e4c3b1b3c

  • SSDEEP

    1572864:QtDax5IpBXssOQMAc2MN71GdBqPbzRtoJGfc5gbkkr8:XxinssOzAcP7odE7o8hkM8

Malware Config

Targets

    • Target

      Node-js.exe

    • Size

      63.5MB

    • MD5

      52131512ecfb302895d8165fcb4b5425

    • SHA1

      d94c0b3801a084527eaf8d160f5915c6d7b568bc

    • SHA256

      79ae38d3832ab7d48543039eff6078538465eb83d8fbb124db2e319295ab5e68

    • SHA512

      0c56edfa095008fa930bcfaec3345a560d5455a62e54f1988e88a25562506d065f57b2f9e9a5a0ecb6e96c36b917c41710764eecc00187d2d75acd6e4c3b1b3c

    • SSDEEP

      1572864:QtDax5IpBXssOQMAc2MN71GdBqPbzRtoJGfc5gbkkr8:XxinssOzAcP7odE7o8hkM8

    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      $PLUGINSDIR/StdUtils.dll

    • Size

      100KB

    • MD5

      c6a6e03f77c313b267498515488c5740

    • SHA1

      3d49fc2784b9450962ed6b82b46e9c3c957d7c15

    • SHA256

      b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e

    • SHA512

      9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

    • SSDEEP

      3072:WNuZmJ9TDP3ahD2TF7Rq9cJNPhF9vyHf:WNuZ81zaAFHhF9v

    Score
    3/10
    • Target

      $PLUGINSDIR/System.dll

    • Size

      12KB

    • MD5

      0d7ad4f45dc6f5aa87f606d0331c6901

    • SHA1

      48df0911f0484cbe2a8cdd5362140b63c41ee457

    • SHA256

      3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca

    • SHA512

      c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

    • SSDEEP

      192:1enY0LWelt70elWjvfstJcVtwtYbjnIOg5AaDnbC7ypXhtIj:18PJlt70esj0Mt9vn6ay6

    Score
    3/10
    • Target

      LICENSES.chromium.html

    • Size

      5.2MB

    • MD5

      27206d29e7a2d80ee16f7f02ee89fb0f

    • SHA1

      3cf857751158907166f87ed03f74b40621e883ef

    • SHA256

      2282bc8fe1798971d5726d2138eda308244fa713f0061534b8d9fbe9453d59ab

    • SHA512

      390c490f7ff6337ee701bd7fc866354ef1b821d490c54648459c382ba63c1e8c92229e1b089a3bd0b701042b7fa9c6d2431079fd263e2d6754523fce200840e2

    • SSDEEP

      12288:/7etnqnVnMnBnunQ9RBvjYJEi400/Q599b769B9UOE6MwMGucMEbHDuX0YnpWQZO:sFEc5FeWSPZza8yUMmfSHCHWJ4pps

    Score
    1/10
    • Target

      Node-js.exe

    • Size

      134.3MB

    • MD5

      06295a324f405a3c7082f1fbadc35f1e

    • SHA1

      513108b3aeb2ad8491c6dd1ad74d4711bc85b2f8

    • SHA256

      80770adbb4d1c5d6736eb80e2aa0246965a76ea99517f0e1a77c16d0f0fc4957

    • SHA512

      41205e55908be61c0bd81fe904710b88dfb1e37d06b1c48d5b66b16f4c52ce2101991f158da3fa228e9b5511cc30563fdf6329c75a4c49554ce294c5ca0d48c7

    • SSDEEP

      1572864:94T4NPd8vk0E4UmdhRhPoXFzcwkqwBWKEFM:v1TJXzV+

    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Target

      d3dcompiler_47.dll

    • Size

      4.3MB

    • MD5

      7641e39b7da4077084d2afe7c31032e0

    • SHA1

      2256644f69435ff2fee76deb04d918083960d1eb

    • SHA256

      44422e6936dc72b7ac5ed16bb8bcae164b7554513e52efb66a3e942cec328a47

    • SHA512

      8010e1cb17fa18bbf72d8344e1d63ded7cef7be6e7c13434fa6d8e22ce1d58a4d426959bdcb031502d4b145e29cb111af929fcbc66001111fbc6d7a19e8800a5

    • SSDEEP

      49152:aYlc/220PPiMLKam+VMrLi21f4i3jn5ZO3XUDmOZQwVd2uQpN3WsGVUWd55i/jrs:a6KD2Mrdaix4NQnLt

    Score
    1/10
    • Target

      ffmpeg.dll

    • Size

      2.6MB

    • MD5

      7dc7b2fb25544a613deaa08b05805d75

    • SHA1

      2cb49bd3427534dbfe00c8929317346c2232a024

    • SHA256

      11c431e680b512e215ea11b64489c865c29aef4c116afae99941712015260d07

    • SHA512

      21c7bcf25a97012c23a58fbe896c5396e889cefd3370735d0d26d0e71eb7bde4b794ccfc56c75bbcf423e1380e3dc5943ac966ae96a57b98860bbbadc8b72996

    • SSDEEP

      49152:Y14LZeiXTFI6vTD9MxCAJ0qsOw0FZnHzKedVLes+/EnvIS:d7hMxjk0vB

    Score
    1/10
    • Target

      libEGL.dll

    • Size

      431KB

    • MD5

      221921bf5e21a84382fe89d21b744356

    • SHA1

      1b72a53fd663e73c3950d8b1c6140db3cdb6f78a

    • SHA256

      175cd7579b98522229ff530789f351c5e052bc28691e75da2b696bea926100a4

    • SHA512

      05d8b1b6c87a95be3c2f42268cc1dcb44db3595d86d45be31211486ee9355f05846d5d4964cd426de6772636348a0a1dd33716a2b2731ca02c451f3bf72fdbfd

    • SSDEEP

      6144:sbSSlxpHPDSDwFRSHXEU4alu73cwp1MmJw7r2qVmTsR6sbg3y:G9lxdPewF43EDaG+0TPqg3

    Score
    1/10
    • Target

      libGLESv2.dll

    • Size

      7.5MB

    • MD5

      368a951df457bbe926e384e452e2c42b

    • SHA1

      3e8f89c4ccbc406824502f6cc0966e74ca8808a2

    • SHA256

      47514cc1d5e169ac196113e795040d5d4f32bc382a1b05b0c9e429c428c7c3df

    • SHA512

      799bf188e4128ed0e7291183a0070b71601dcc65a393f40f3e25d7c72f637cc820bd06affa1d109e056ef9c2cf20ab218af13da194dd1d183983bf9878df79fd

    • SSDEEP

      49152:tvtCmX2Qw60vV+7EHbsoNIs1BnRvzzo7FK2tg9+En9FwCn0F3ePlGUVOAMAPWS54:52+ZKFqqnkgNJFQUxatiePxRe6Xm

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/index.js

    • Size

      3KB

    • MD5

      d226502c9bf2ae0a7f029bd7930be88e

    • SHA1

      6be773fb30c7693b338f7c911b253e4f430c2f9b

    • SHA256

      77a3965315946a325ddcf0709d927ba72aa47f889976cbccf567c76cc545159f

    • SHA512

      93f3d885dad1540b1f721894209cb7f164f0f6f92857d713438e0ce685fc5ee1fc94eb27296462cdeede49b30af8bf089a1fc2a34f8577479645d556aaac2f8e

    Score
    1/10
    • Target

      resources/app.asar.unpacked/node_modules/screenshot-desktop/lib/win32/screenCapture_1.3.2.bat

    • Size

      13KB

    • MD5

      da0f40d84d72ae3e9324ad9a040a2e58

    • SHA1

      4ca7f6f90fb67dce8470b67010aa19aa0fd6253f

    • SHA256

      818350a4fb4146072a25f0467c5c99571c854d58bec30330e7db343bceca008b

    • SHA512

      30b7d4921f39c2601d94a3e3bb0e3be79b4b7b505e52523d2562f2e2f32154d555a593df87a71cddb61b98403265f42e0d6705950b37a155dc1d64113c719fd9

    • SSDEEP

      384:4cr8sEcBeIXxqXhQsBxf5oBLBfXQM8ybCpGW1KTM+:4KEcRQBTxWlPZxWpG+Qx

    Score
    7/10
    • Executes dropped EXE

    • Target

      resources/elevate.exe

    • Size

      105KB

    • MD5

      792b92c8ad13c46f27c7ced0810694df

    • SHA1

      d8d449b92de20a57df722df46435ba4553ecc802

    • SHA256

      9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37

    • SHA512

      6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

    • SSDEEP

      3072:1bLnrwQoRDtdMMgSXiFJWcIgUVCfRjV/GrWl:1PrwRhte1XsE1l

    Score
    1/10
    • Target

      swiftshader/libEGL.dll

    • Size

      445KB

    • MD5

      e7dd19ed46c7a21d0101d1a5cc0fe39b

    • SHA1

      89a51cd7d4c7a6f3dca571b24bce726568292ea1

    • SHA256

      d8d1b787de2e2dae70ebb21dadf734dd11ceac03f9a873c911f4b2e2477b745c

    • SHA512

      921f276efa055eb4136572e889e7741bd3fd776065f70495d6ede7d1cdf0cc933c67f9eec82bd5a5d30f77ec8bfce83f46d00e65ba1488ff95ee38004567105c

    • SSDEEP

      6144:ND5bSb+dOqrMEv3lKyEeWZJ+vAFpnLt53h30kjuhHZq0V:2b+8qQEv3nInLt8dZtV

    Score
    1/10
    • Target

      swiftshader/libGLESv2.dll

    • Size

      3.0MB

    • MD5

      f6fc51755690e7ae2380d7606c0303bf

    • SHA1

      aa98430be7f0591b054b52db556d032c5e8dae3b

    • SHA256

      7747ba44a1caa758106d3a2a67438933cca7e7ede2d564c2fa7be2b11b206506

    • SHA512

      7974b4f1c64d512d0769e8d991b30a28697d561dd0e20927835059459a6f14d3ee5b04a7454e744481f10b1281a5b6b3091adb3212b59527528a35e05c57fa78

    • SSDEEP

      49152:7+H0cC+Ib0QRnvfENDNA+3eOAPf6dLO7MacKYTA+OV38dgnU4nWQ+qJmMsFLufbE:SH0ttRipIsBGM

    Score
    1/10
    • Target

      vk_swiftshader.dll

    • Size

      4.3MB

    • MD5

      679bbc7de5f8fccc8f68d1fc5d5d3156

    • SHA1

      5dbe2043d1108f273c7f84d31183c01cb3e12624

    • SHA256

      5ab2d9f61fc256b398b80a6223aa187041525b0891c36a9fe64bdc6e37c0bc55

    • SHA512

      12b8d60d5debfc5c7281eb2a3b296d13c8a0254286f81321640dbc526ab00435a719691e755df5706b00a79d06f825b19968ba699ac72031a69dfabbdc95ff63

    • SSDEEP

      49152:6QEStOXH0nQ7MY4KF6SZBUcgURTEXjvvoOLr3NXYMASpO5ewKmnTNDN54tFqjLNk:baCJwU1tRFn8FjF

    Score
    1/10
    • Target

      vulkan-1.dll

    • Size

      715KB

    • MD5

      16cd9deb27a902f758d72f5fe3bfa94a

    • SHA1

      b5209cf5493b1c7f93ee4cafea5586ae7ca3aa93

    • SHA256

      a2c6fc4251700f4e5129d5363df8c69a43dff6d46dad61d76b9e75209eeab11a

    • SHA512

      82a31cb2a93bd1fe317ef7a7d15b61ad02dfd636629f1e156e6b0ae81218218a1184d83512f0b549b1baae32c7845b7265b5b69094bb12c90cd2bb61a1a34570

    • SSDEEP

      12288:5+Ru04Y7t/DlHZkyHQiKy99o1d+aXbF9r8PIoILdWG:5f1YZ/fkywby9m1IaXj8A9

    Score
    1/10
    • Target

      $PLUGINSDIR/nsis7z.dll

    • Size

      424KB

    • MD5

      80e44ce4895304c6a3a831310fbf8cd0

    • SHA1

      36bd49ae21c460be5753a904b4501f1abca53508

    • SHA256

      b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592

    • SHA512

      c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

    • SSDEEP

      6144:aUWQQ5O3fz0NG3ucDaEUTWfk+ZA0NrCL/k+uyoyBOX1okfW7w+Pfzqibckl:an5QEG39fPAkrE4yrBOXDfaNbck

    Score
    3/10

MITRE ATT&CK Enterprise v15

Tasks

static1

Score
3/10

behavioral1

Score
7/10

behavioral2

epsilonpersistencespywarestealer
Score
10/10

behavioral3

Score
3/10

behavioral4

Score
3/10

behavioral5

Score
3/10

behavioral6

Score
3/10

behavioral7

Score
1/10

behavioral8

Score
1/10

behavioral9

epsilonpersistencespywarestealer
Score
10/10

behavioral10

epsilonpersistencespywarestealer
Score
10/10

behavioral11

Score
1/10

behavioral12

Score
1/10

behavioral13

Score
1/10

behavioral14

Score
1/10

behavioral15

Score
1/10

behavioral16

Score
1/10

behavioral17

Score
1/10

behavioral18

Score
1/10

behavioral19

Score
1/10

behavioral20

Score
7/10

behavioral21

Score
7/10

behavioral22

Score
1/10

behavioral23

Score
1/10

behavioral24

Score
1/10

behavioral25

Score
1/10

behavioral26

Score
1/10

behavioral27

Score
1/10

behavioral28

Score
1/10

behavioral29

Score
1/10

behavioral30

Score
1/10

behavioral31

Score
1/10

behavioral32

Score
3/10